Practice More Questions From: Threat Intelligence Graded Assessment
Q:
Which three (3) of these were among the top 5 security drivers in 2019? (Select 3)
Q:
What was the average time to identify and contain a breach in 2019?
Q:
Which industry had the highest average cost per breach in 2019 at $6.45M
Q:
Breaches caused by which source resulted in the highest cost per incident in 2019?
Q:
According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as normalize, correlate, confirm and enrich the data?
Q:
According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as investigate, contain, remediate and prioritize?
Q:
According to the Crowdstrike model, threat hunters, vulnerability management and incident response belong in which intelligence area?
Q:
Which three (3) sources are recommended reading for any cybersecurity professional? (Select 3)
Q:
Which two (2) of these were among the 4 threat intelligence platforms covered in the Threat Intelligence Platforms video? (Select 2)
Q:
True or False. An organization’s security immune system should be isolated from outside organizations, including vendors and other third-parties to keep it from being compromised.
Q:
Which threat intelligence framework is divided into 3 levels. Level 1 is getting to know your adversaries. Level 2 involves mapping intelligence yourself and level 3 where you map more information and use that to plan your defense?
Q:
Activities performed as a part of security intelligence can be divided into pre-exploit and post-exploit activities. Which two (2) of these are pre-exploit activities? (Select 2)
Q:
True or False. According to the FireEye Mandiant’s Security Effectiveness Report 2020, more that 50% of successful attacks are able to infiltrate without detection.
Subscribe
0 Comments