Cyber Threat Intelligence All Quiz Answers | Threat Hunting Graded Assignment | Week 5

Cyber Threat Intelligence All Quiz Answers  Threat Hunting Graded Assignment  Week 5


Threat Hunting Overview Knowledge Check ( Practice Quiz )


Q1) Cyber threats pose many challenges to organizations today. Which three (3) of these are among those cited ? (Select 3)

  • It takes an average of 191 days to even detect an attack has occurred
  • Almost half of the breaches are caused by malicious or criminal acts
  • There is a cybersecurity skills shortage


Q2) What percent of security leaders reported that threat hunting increased the speed and accuracy of response in detection of advanced threats ?

  • 91%


Q3) While 80% of the threats are known and detected, the 20% that remains unknown account for what percent of the damage ?

  • 80%


Q4) True or False. The skill set of a cyber threat hunter is very different from that of a cybersecurity analyst and many threat hunters a have backrounds doing intelligence work.

  • True


Q5) Your enemy uses a cyber kill chain to plan and execute his attack against your organization. Which three (3) of these are steps in a cyber kill chain ? (Select 3)

  • Weaponization
  • Delivery
  • Reconnaissance


Q6) True or False. A cyber threat hunting team generally sits at the center of the SOC Command Center.

  • False


Q7) There is value brought by each of the IBM i2 EIA use cases. Which one of these delivers net new discovery of correlating low level alerts and offenses ?

  • Cyber Threat Hunting







Threat Hunting Graded Assignment ( Main Quiz )



Q1) What is one thing that makes cybersecurity threats so challenging to deal with ?

  • There is a big shortage in cyber security skills and many job openings unfilled


Q2) The level 3 and 4 cybersecurity analysts working in a Security Operations Center (SOC) combat cyber crime by performing which type of activity ?

  • Cyber forensic investigations


Q3) True or False. If you have no better place to start hunting threats, start with a view of your own organization then work your way up to an industry view and then a regional view, a national view and finally a global view of the threat landscape.

  • False


Q4) Your enemy uses a cyber kill chain to plan and execute his attack against your organization. Which three (3) of these are steps in a cyber kill chain ?

  • Installation
  • Delivery
  • Exploitation


Q5) True or False. A cyber threat hunting team generally sits outside the SOC command center.

  • True


Q6) There is value brought by each of the IBM i2 EIA use cases. Which one of these identifies net new money chain transfers ?

  • Fraud Investigations







*****************************************************************************************************


Cyber Threat Intelligence










Post a Comment

0 Comments