Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. This website is used to share cyber threat indicators and defensive measures. A. Structured Threat Information eXpression (STIX)

1.  This website is used to share cyber threat indicators and defensive measures.
    A.     Structured Threat Information eXpression (STIX)
    B.     indicators of compromise (IoC)
    C.     Automated Indicator Sharing (AIS)
    D.     Trusted Automated eXchange of Indicator Information (TAXII)

2.  _____ is a malicious attacker performing criminal activities, such as script kiddies, criminal syndicates, and APTs.
    A.     semi-authorized hacker
    B.     authorized hacker
    C.     unauthorized hacker
    D.     shadow IT

3.  This shows a visual representation of active threats.
    A.     file/code repositories
    B.     threat maps
    C.     predictive analysis
    D.     indicators of compromise (IoC)

4.  Your tree logging organization recently got hacked. The attackers caused all the computer screens to display the message “Stop cutting down trees!” Which of the following is the MOST likely threat actor?
    A.     insider
    B.     competitor
    C.     hacktivist
    D.     script kiddie

5.  Hackers may store their code here.
    A.     predictive analysis
    B.     file/code repositories
    C.     indicators of compromise (IoC)
    D.     threat maps

6.  These provide updates about cybersecurity threats common to a specific industry or location.
    A.     Local industry groups
    B.     Academic journals
    C.     Threat feeds
    D.     Request for comments (RFC)

7.  GitHub is an example of this.
    A.     predictive analysis
    B.     indicators of compromise (IoC)
    C.     file/code repositories
    D.     threat maps

8. These are knowledge bases where we can learn how hackers behave. We can use this knowledge to help prevent their attacks.
    A.     Adversary tactics, techniques, and procedures (TTP)
    B.     Social media
    C.     Request for comments (RFC)
    D.     Threat feeds

9.  This research source may provide updates about cybersecurity threats, but need to be verified by other sources.
    A.     Academic journals
    B.     Request for comments (RFC)
    C.     Social media
    D.     Local industry groups

10.  These provide the standards behind the Internet.
    A.     Threat feeds
    B.     Academic journals
    C.     Request for comments (RFC)
    D.     Adversary tactics, techniques, and procedures (TTP)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

The detailed answer for the above question is provided below The correct option for each question are as follows 1 C Automated Indicator Sharing AIS 2 ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Modern Advanced Accounting In Canada

Authors: Hilton Murray, Herauf Darrell

7th Edition

1259066487, 978-1259066481

More Books

Students also viewed these Programming questions

Question

What is the polarized membrane state? How is it maintained?

Answered: 1 week ago

Question

What sort of reconciliations is required for segmented reporting?

Answered: 1 week ago