Question
1. This website is used to share cyber threat indicators and defensive measures. A. Structured Threat Information eXpression (STIX)
1. This website is used to share cyber threat indicators and defensive measures.
A. Structured Threat Information eXpression (STIX)
B. indicators of compromise (IoC)
C. Automated Indicator Sharing (AIS)
D. Trusted Automated eXchange of Indicator Information (TAXII)
2. _____ is a malicious attacker performing criminal activities, such as script kiddies, criminal syndicates, and APTs.
A. semi-authorized hacker
B. authorized hacker
C. unauthorized hacker
D. shadow IT
3. This shows a visual representation of active threats.
A. file/code repositories
B. threat maps
C. predictive analysis
D. indicators of compromise (IoC)
4. Your tree logging organization recently got hacked. The attackers caused all the computer screens to display the message “Stop cutting down trees!” Which of the following is the MOST likely threat actor?
A. insider
B. competitor
C. hacktivist
D. script kiddie
5. Hackers may store their code here.
A. predictive analysis
B. file/code repositories
C. indicators of compromise (IoC)
D. threat maps
6. These provide updates about cybersecurity threats common to a specific industry or location.
A. Local industry groups
B. Academic journals
C. Threat feeds
D. Request for comments (RFC)
7. GitHub is an example of this.
A. predictive analysis
B. indicators of compromise (IoC)
C. file/code repositories
D. threat maps
8. These are knowledge bases where we can learn how hackers behave. We can use this knowledge to help prevent their attacks.
A. Adversary tactics, techniques, and procedures (TTP)
B. Social media
C. Request for comments (RFC)
D. Threat feeds
9. This research source may provide updates about cybersecurity threats, but need to be verified by other sources.
A. Academic journals
B. Request for comments (RFC)
C. Social media
D. Local industry groups
10. These provide the standards behind the Internet.
A. Threat feeds
B. Academic journals
C. Request for comments (RFC)
D. Adversary tactics, techniques, and procedures (TTP)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
The detailed answer for the above question is provided below The correct option for each question are as follows 1 C Automated Indicator Sharing AIS 2 ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started