According to the Crowdstrike model, threat hunters, vulnerability management and incident response belong in which intelligence area?

Practice More Questions From: Threat Intelligence Graded Assessment

Q:

Which three (3) of these were among the top 5 security drivers in 2019? (Select 3)

Q:

Which industry had the highest average cost per breach in 2019 at $6.45M

Q:

What was the average time to identify and contain a breach in 2019?

Q:

Breaches caused by which source resulted in the highest cost per incident in 2019?

Q:

According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as normalize, correlate, confirm and enrich the data?

Q:

According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as investigate, contain, remediate and prioritize?

Q:

According to the Crowdstrike model, threat hunters, vulnerability management and incident response belong in which intelligence area?

Q:

Which three (3) sources are recommended reading for any cybersecurity professional? (Select 3)

Q:

Which two (2) of these were among the 4 threat intelligence platforms covered in the Threat Intelligence Platforms video? (Select 2)

Q:

Which threat intelligence framework is divided into 3 levels. Level 1 is getting to know your adversaries. Level 2 involves mapping intelligence yourself and level 3 where you map more information and use that to plan your defense?

Q:

True or False. An organization’s security immune system should be isolated from outside organizations, including vendors and other third-parties to keep it from being compromised.

Q:

Activities performed as a part of security intelligence can be divided into pre-exploit and post-exploit activities. Which two (2) of these are pre-exploit activities? (Select 2)

Q:

True or False. According to the FireEye Mandiant’s Security Effectiveness Report 2020, more that 50% of successful attacks are able to infiltrate without detection.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments