Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?
Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?A . RepeaterB . GatewayC . HubD . Network interface card (NIC)View AnswerAnswer: B
Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target’s network?
Which of the following characteristics of APT refers to numerous attempts done by the attacker to gain entry to the target’s network?A . Risk toleranceB . TimelinessC . Attack origination pointsD . MultiphasedView AnswerAnswer: C
Which of the following threat intelligence frameworks should he choose to perform such task?
Tim is working as an analyst in an ABC organization. His organization had been facing many challenges in converting the raw threat intelligence data into meaningful contextual information. After inspection, he found that it was due to noise obtained from misrepresentation of data from huge data collections. Hence, it is...
Which of the following considerations must be employed by Henry to prioritize intelligence requirements?
Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was assigned to work on establishing criteria for prioritization of intelligence needs and requirements. Which of the following considerations must be employed by Henry to prioritize intelligence requirements?A . Understand frequency and impact of...
Which of the following sources of intelligence did the analyst use to collect information?
An analyst is conducting threat intelligence analysis in a client organization, and during the information gathering process, he gathered information from the publicly available sources and analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily used for national security, law enforcement, and...
Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?
Which of the following types of threat attribution deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target?A . Nation-state attributionB . True attributionC . Campaign attributionD . Intrusion-set attributionView AnswerAnswer: B
What is the correct sequence of steps involved in scheduling a threat intelligence program?
What is the correct sequence of steps involved in scheduling a threat intelligence program? A . 1-->9-->2-->8-->3-->7-->4-->6-->5B . 3-->4-->5-->2-->1-->9-->8-->7-->6C . 1-->2-->3-->4-->5-->6-->9-->8-->7D . 1-->2-->3-->4-->5-->6-->7-->8-->9View AnswerAnswer: A
Which of the following technique is used by the attacker?
An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses. Which of the following technique is used by the attacker?A . DNS zone...
Which of the following categories of threat intelligence feed was acquired by Jian?
Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs. Which of the following categories of threat intelligence feed was...
What phase of the advanced persistent threat lifecycle is John currently in?
John, a professional hacker, is trying to perform APT attack on the target organization network. He gains access to a single system of a target organization and tries to obtain administrative login credentials to gain further access to the systems in the network using various techniques. What phase of the...