Quiz Summary
0 of 13 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 13 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- Current
- Review / Skip
- Answered
- Correct
- Incorrect
-
Question 1 of 13
1. Question
Olivia is considering potential sources for threat intelligence information that she might incorporate into her security program. Which one of the following sources is most likely to be available without a subscription fee?
CorrectIncorrect -
Question 2 of 13
2. Question
Roger is evaluating threat intelligence information sources and finds that one source results in quite a few false positive alerts. This lowers his confidence level in the source. What criteria for intelligence is not being met by this source?
CorrectIncorrect -
Question 3 of 13
3. Question
Brad is working on a threat classification exercise, analyzing known threats and assessing the possibility of unknown threats. Which one of the following threat actors is most likely to be associated with an advanced persistent threat (APT)?
CorrectIncorrect -
Question 4 of 13
4. Question
What term is used to describe the groups of related organizations that pool resources to share cybersecurity threat information and analyses?
CorrectIncorrect -
Question 5 of 13
5. Question
Singh incorporated the Cisco Talos tool into his organization’s threat intelligence program. He uses it to automatically look up information about the past activity of IP addresses sending email to his mail servers. What term best describes this intelligence source?
CorrectIncorrect -
Question 6 of 13
6. Question
Jamal is assessing the risk to his organization from their planned use of AWS Lambda, a serverless computing service that allows developers to write code and execute functions directly on the cloud platform. What cloud tier best describes this service?
CorrectIncorrect -
Question 7 of 13
7. Question
Lauren’s honeynet, shown here, is configured to use a segment of unused network space that has no legitimate servers in it. This design is particularly useful for detecting what types of threats?
CorrectIncorrect -
Question 8 of 13
8. Question
Which one of the following functions is not a common recipient of threat intelligence information?
CorrectIncorrect -
Question 9 of 13
9. Question
Alfonzo is an IT professional at a Portuguese university who is creating a cloud environment for use only by other Portuguese universities. What type of cloud deployment model is he using?
CorrectIncorrect -
Question 10 of 13
10. Question
As a member of a blue team, Lukas observed the following behavior during an external penetration test. What should he report to his managers at the conclusion of the test?
CorrectIncorrect -
Question 11 of 13
11. Question
The company that Maria works for is making significant investments in infrastructure-as-a-service hosting to replace its traditional datacenter. Members of her organization’s management have Maria’s concerns about data remanence when Lauren’s team moves fromĀ one virtual host to another in their cloud service provider’s environment. What should she instruct her team to do to avoid this concern?
CorrectIncorrect -
Question 12 of 13
12. Question
Geoff is reviewing logs and sees a large number of attempts to authenticate to his VPN server using many different username and password combinations. The same usernames are attempted several hundred times before moving on to the next one. What type of attack is most likely taking place?
CorrectIncorrect -
Question 13 of 13
13. Question
Kaiden is configuring a SIEM service in his IaaS cloud environment that will receive all of the log entries generated by other devices in that environment. Which one of the following risks is greatest with this approach in the event of a DoS attack or other outage?
CorrectIncorrect