ログイン

L.O. | The Threat Intelligence Cycle
40問 • 4ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    /// Part 1 | The Threat Intelligence Cycle ///

    The Threat Intelligence Cycle | ok

  • 2

    Another term for Information?

    - Intelligence

  • 3

    Define the Threat Intelligence Cycle?

    - A concept, - A Approach

  • 4

    Purpose of The Threat Intelligence Cycle?

    - Feel Knowledge Gaps., - Establish well structured set of information., - Used to make smart decisions about Security.

  • 5

    Example Use Cases of The Threat Intelligence life Cycle?

    - Firewalls to buy., - Where to deploy technical appliances., - System that requires patching.

  • 6

    Five phases of the Threat Intelligence Cycle?

    - Planning and Requirements., - Collection and Processing., - Analysis., - Dissemination., - Feedback.

  • 7

    What is the first phase of The Threat Intelligence Cycle?

    - Planning and Requirements

  • 8

    Clarifying Questions of The Planning and Requirements Phase?

    - Why are we doing it?, - What’s our goal?

  • 9

    Important requirements to be aligned with in the 1st Phase “ Planning and Requirements “ within the Threat Intelligence Cycle?

    - Business Requirements

  • 10

    Restrictions to align with in the 1st Phase “ Planning and Requirements “, with the Threat Intelligence Cycle?

    - Legal Restrictions.

  • 11

    A Key factor to decide in the 1st Phase “ Planning and Requirements “, within the Threat Intelligence Cycle?

    - Most likely threats.

  • 12

    Overall objective of the 1st Phase ‘ Planning and Requirements ‘, with the Threat Intelligence Cycle?

    - Having a starting point.

  • 13

    What is the 2nd Phase of the Threat Intelligence Cycle?

    - Collection and Processing

  • 14

    Purpose of the 2nd Phase ‘ Collection and Processing ‘?

    - To gather information., - In an Organized Manner., - With a focus on keeping information consistent.

  • 15

    Best practice to implement in the 2nd Phase ‘ Collection and Processing ‘, within the Threat Intelligence Cycle?

    - Automated Practices.

  • 16

    Possible sources of information to collect within the 2nd Phase ‘ Collection and Processing ‘, within the Threat Intelligence Cycle ?

    - Laptops., - Mobile Devices., - Switches., - Firewalls., - Servers., - Applications., - Cloud.

  • 17

    What ensures information from multiple sources remains consistent and organized?

    - Processing and Normalization.

  • 18

    What is the 3rd Phase of the Threat Intelligence Cycle?

    - Analysis.

  • 19

    purpoae of the 3rd Phase ‘ Analysis ‘, within the Threat Intelligence Cycle?

    - Transform raw, collected data., - into meaningful, actionable intelligence. , - Bridge gap between., - Gathering information., - and using it to make informed security decisions.

  • 20

    Tools and Sources used in the 3rd Phase ‘ Analysis ‘, within the Threat Intelligence Cycle?

    - Automation., - Scripts:, - Bash., - Python., - PowerShell., - S.I.E.M. Systems., - Stands for Security Information and Event Management., - Manual input ( Least Recommended)

  • 21

    In regards to the threat intelligence cycle what is Correlation?

    - Process of linking and analyzing., - Different pieces of raw data., - To uncover hidden connections and patterns.

  • 22

    Why is ‘ Correlation ‘ a key part in the 3rd Phase ‘ Analysis ‘, with the Threat Intelligence Cycle?

    - Transforms raw information., - From various sources., - Into actionable intelligence.

  • 23

    What is the 4th Phase in the Threat Intelligence Cycle?

    - Dissemination.

  • 24

    What is the purpose of Dissemination?

    - Deliver finished, actionable intelligence., - To the right people at the right time., - Transform technical analysis into. - A usable product that. - Drives security decisions and actions.

  • 25

    In regards to Phase #4 Dissemination, What type of audience is projected for?

    - All audiences, audiences including:, - Multiple People, Multiple Levels /, - Tech People ( Configuration of Devices, Respond to Incidence ), - Upper Management , - C.E.O. Level

  • 26

    What is an important challenge within the 4th Phase ‘ Dissemination’, within the Threat Intelligence Cycle?

    - Conmunicating the same findings., - Communicating the same ideas., - To Multiple Audiences.

  • 27

    Factors of different audiences within the 4th Phase ‘ Dissemination ‘, within the Threat Intelligence Cycle?

    - Different Sector., - Different Findings, - Ex. |, - Security Analysis Report, - Different from., - C.E.O Report

  • 28

    Three levels of 4th Phase ‘ Dissemination ‘, within the Threat Intelligence Cycle?

    - Strategic Intelligence. , - Operational Intelligence., - Tactical Intelligence.

  • 29

    What is the first level within the 4th Phase ‘ Dissemination ‘,under the Threat Intelligence Cycle.

    - Strategic Objectives.

  • 30

    Purpose of the Strategic Level, within the 4th Phase ‘ Dissemination ’, within the Threat Intelligence Cycle?

    - Addresses Long Term Objective., - Addresses Priorities.

  • 31

    What is 2nd Level of Intelligence, in the 4th Phase ‘ Dissemination ‘, within the the Threat Intelligence Cycle:

    - Operational Intelligence.

  • 32

    Purpose of the Operational Intelligence Level, within the 4th Phase ‘ Dissemination ’, within the Threat Intelligence Cycle?

    - Day to Day Priorities of I.T. ( Security Specialists/ as well as managers ), - Focused on Short term objectives.

  • 33

    What is 3rd Level of Intelligence, in the 4th Phase ‘ Dissemination ‘, within the the Threat Intelligence Cycle:

    - Tactical Intelligence.

  • 34

    Purpose of the Tactical Intelligence Level, within the 4th Phase ‘ Dissemination ’, within the Threat Intelligence Cycle?

    - Real Time ( Shortest Term Objectives ), - Intelligence that requires immediate action., - Tasks that needed to be ready yesterday.

  • 35

    Extended Purpose of the Threat Intelligence Cycle?

    - Continously improve processes., - This is a repetitive phase., - For that to happen, this requires the 5th Phase ‘ Feedback ‘, within the Threat Intelligence Cycle.

  • 36

    What is the 5th Phase within the Threat Intelligence Model?

    - Feedback.

  • 37

    Purpose of the 5th ‘ Feedback ‘ Phase, within the Threat Intelligence Cycle?

    - Not about providing feedback to you collides., - This is about., - Feeding information back into the Threat Intelligence Cycle.

  • 38

    Examples of feedback information within the 5th Phase ‘ Feedback ‘, in the Threat Intelligence Cycle?

    - New Findings, New Information., - Lessons Learned:.., - What went right, what went wrong., - Lessons learned from the previous steps., - Did you discover anything new, since last time., - Any new Threats out there?., - New Risks., - New Threats., - Something new you should be doing.

  • 39

    In Conclusion to The 5th Phase ‘ Feedback ‘, within the Threat Intelligence Cycle.

    - End phase with clear list of tasks., - For a Clear List Of People., - That are responsible for making your Threat Intelligence Cycle.

  • 40

    Reviewation of Exam Recap:

    - Know and Understand. , - All Phases of Threat Intelligence Cycle., - Possibly Questions of how., - Which activity to belonging to which phase of the cycle.

  • examen Alexandru

    examen Alexandru

    ユーザ名非公開 · 40問 · 7日前

    examen Alexandru

    examen Alexandru

    40問 • 7日前
    ユーザ名非公開

    COMPUTER 2ND QUARTER

    COMPUTER 2ND QUARTER

    Karla Marie Ybañez · 38問 · 4ヶ月前

    COMPUTER 2ND QUARTER

    COMPUTER 2ND QUARTER

    38問 • 4ヶ月前
    Karla Marie Ybañez

    History and Discovery of Microorganisms

    History and Discovery of Microorganisms

    HERSHEY VALERIE BERNARDINO · 80問 · 4ヶ月前

    History and Discovery of Microorganisms

    History and Discovery of Microorganisms

    80問 • 4ヶ月前
    HERSHEY VALERIE BERNARDINO

    Introduction to Computing

    Introduction to Computing

    ユーザ名非公開 · 19問 · 4ヶ月前

    Introduction to Computing

    Introduction to Computing

    19問 • 4ヶ月前
    ユーザ名非公開

    4.1

    4.1

    Sab Sescon · 34問 · 4ヶ月前

    4.1

    4.1

    34問 • 4ヶ月前
    Sab Sescon

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Xai Alexandrei Delos Reyes · 60問 · 4ヶ月前

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    Data and Digital Communication Mocktest (Prelim) BSIT 505

    60問 • 4ヶ月前
    Xai Alexandrei Delos Reyes

    css

    css

    En. km · 33問 · 5ヶ月前

    css

    css

    33問 • 5ヶ月前
    En. km

    Css 3 quiz

    Css 3 quiz

    En. km · 36問 · 5ヶ月前

    Css 3 quiz

    Css 3 quiz

    36問 • 5ヶ月前
    En. km

    21 ) SY EX. 5 | COMPLETE

    21 ) SY EX. 5 | COMPLETE

    The R.S.S.H Delivery Company · 91問 · 5ヶ月前

    21 ) SY EX. 5 | COMPLETE

    21 ) SY EX. 5 | COMPLETE

    91問 • 5ヶ月前
    The R.S.S.H Delivery Company

    SY EX | 4 MASTER | notCOMPLETE

    SY EX | 4 MASTER | notCOMPLETE

    The R.S.S.H Delivery Company · 90問 · 5ヶ月前

    SY EX | 4 MASTER | notCOMPLETE

    SY EX | 4 MASTER | notCOMPLETE

    90問 • 5ヶ月前
    The R.S.S.H Delivery Company

    SY EX | 2 MASTER

    SY EX | 2 MASTER

    The R.S.S.H Delivery Company · 333問 · 6ヶ月前

    SY EX | 2 MASTER

    SY EX | 2 MASTER

    333問 • 6ヶ月前
    The R.S.S.H Delivery Company

    The OSI Model and Encapsulation

    The OSI Model and Encapsulation

    ユーザ名非公開 · 12問 · 6ヶ月前

    The OSI Model and Encapsulation

    The OSI Model and Encapsulation

    12問 • 6ヶ月前
    ユーザ名非公開

    15 ) EX. 14 | COMPLETE

    15 ) EX. 14 | COMPLETE

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    15 ) EX. 14 | COMPLETE

    15 ) EX. 14 | COMPLETE

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    セキュリティ

    セキュリティ

    akari · 30問 · 8ヶ月前

    セキュリティ

    セキュリティ

    30問 • 8ヶ月前
    akari

    いんふぉるまちおん

    いんふぉるまちおん

    かわまた · 89問 · 11ヶ月前

    いんふぉるまちおん

    いんふぉるまちおん

    89問 • 11ヶ月前
    かわまた

    LETP TEST

    LETP TEST

    tanner · 92問 · 11ヶ月前

    LETP TEST

    LETP TEST

    92問 • 11ヶ月前
    tanner

    competenence 9

    competenence 9

    Leodegario Almaden jr. · 100問 · 11ヶ月前

    competenence 9

    competenence 9

    100問 • 11ヶ月前
    Leodegario Almaden jr.

    Plumbing Arithmetic Terms 3

    Plumbing Arithmetic Terms 3

    Vaantoote · 49問 · 1年前

    Plumbing Arithmetic Terms 3

    Plumbing Arithmetic Terms 3

    49問 • 1年前
    Vaantoote

    An Ninh Vip Pro 2

    An Ninh Vip Pro 2

    Ngọc Bích Trần · 40問 · 1年前

    An Ninh Vip Pro 2

    An Ninh Vip Pro 2

    40問 • 1年前
    Ngọc Bích Trần

    HPC 102 FINALS

    HPC 102 FINALS

    Leah Jean Better · 27問 · 1年前

    HPC 102 FINALS

    HPC 102 FINALS

    27問 • 1年前
    Leah Jean Better

    問題一覧

  • 1

    /// Part 1 | The Threat Intelligence Cycle ///

    The Threat Intelligence Cycle | ok

  • 2

    Another term for Information?

    - Intelligence

  • 3

    Define the Threat Intelligence Cycle?

    - A concept, - A Approach

  • 4

    Purpose of The Threat Intelligence Cycle?

    - Feel Knowledge Gaps., - Establish well structured set of information., - Used to make smart decisions about Security.

  • 5

    Example Use Cases of The Threat Intelligence life Cycle?

    - Firewalls to buy., - Where to deploy technical appliances., - System that requires patching.

  • 6

    Five phases of the Threat Intelligence Cycle?

    - Planning and Requirements., - Collection and Processing., - Analysis., - Dissemination., - Feedback.

  • 7

    What is the first phase of The Threat Intelligence Cycle?

    - Planning and Requirements

  • 8

    Clarifying Questions of The Planning and Requirements Phase?

    - Why are we doing it?, - What’s our goal?

  • 9

    Important requirements to be aligned with in the 1st Phase “ Planning and Requirements “ within the Threat Intelligence Cycle?

    - Business Requirements

  • 10

    Restrictions to align with in the 1st Phase “ Planning and Requirements “, with the Threat Intelligence Cycle?

    - Legal Restrictions.

  • 11

    A Key factor to decide in the 1st Phase “ Planning and Requirements “, within the Threat Intelligence Cycle?

    - Most likely threats.

  • 12

    Overall objective of the 1st Phase ‘ Planning and Requirements ‘, with the Threat Intelligence Cycle?

    - Having a starting point.

  • 13

    What is the 2nd Phase of the Threat Intelligence Cycle?

    - Collection and Processing

  • 14

    Purpose of the 2nd Phase ‘ Collection and Processing ‘?

    - To gather information., - In an Organized Manner., - With a focus on keeping information consistent.

  • 15

    Best practice to implement in the 2nd Phase ‘ Collection and Processing ‘, within the Threat Intelligence Cycle?

    - Automated Practices.

  • 16

    Possible sources of information to collect within the 2nd Phase ‘ Collection and Processing ‘, within the Threat Intelligence Cycle ?

    - Laptops., - Mobile Devices., - Switches., - Firewalls., - Servers., - Applications., - Cloud.

  • 17

    What ensures information from multiple sources remains consistent and organized?

    - Processing and Normalization.

  • 18

    What is the 3rd Phase of the Threat Intelligence Cycle?

    - Analysis.

  • 19

    purpoae of the 3rd Phase ‘ Analysis ‘, within the Threat Intelligence Cycle?

    - Transform raw, collected data., - into meaningful, actionable intelligence. , - Bridge gap between., - Gathering information., - and using it to make informed security decisions.

  • 20

    Tools and Sources used in the 3rd Phase ‘ Analysis ‘, within the Threat Intelligence Cycle?

    - Automation., - Scripts:, - Bash., - Python., - PowerShell., - S.I.E.M. Systems., - Stands for Security Information and Event Management., - Manual input ( Least Recommended)

  • 21

    In regards to the threat intelligence cycle what is Correlation?

    - Process of linking and analyzing., - Different pieces of raw data., - To uncover hidden connections and patterns.

  • 22

    Why is ‘ Correlation ‘ a key part in the 3rd Phase ‘ Analysis ‘, with the Threat Intelligence Cycle?

    - Transforms raw information., - From various sources., - Into actionable intelligence.

  • 23

    What is the 4th Phase in the Threat Intelligence Cycle?

    - Dissemination.

  • 24

    What is the purpose of Dissemination?

    - Deliver finished, actionable intelligence., - To the right people at the right time., - Transform technical analysis into. - A usable product that. - Drives security decisions and actions.

  • 25

    In regards to Phase #4 Dissemination, What type of audience is projected for?

    - All audiences, audiences including:, - Multiple People, Multiple Levels /, - Tech People ( Configuration of Devices, Respond to Incidence ), - Upper Management , - C.E.O. Level

  • 26

    What is an important challenge within the 4th Phase ‘ Dissemination’, within the Threat Intelligence Cycle?

    - Conmunicating the same findings., - Communicating the same ideas., - To Multiple Audiences.

  • 27

    Factors of different audiences within the 4th Phase ‘ Dissemination ‘, within the Threat Intelligence Cycle?

    - Different Sector., - Different Findings, - Ex. |, - Security Analysis Report, - Different from., - C.E.O Report

  • 28

    Three levels of 4th Phase ‘ Dissemination ‘, within the Threat Intelligence Cycle?

    - Strategic Intelligence. , - Operational Intelligence., - Tactical Intelligence.

  • 29

    What is the first level within the 4th Phase ‘ Dissemination ‘,under the Threat Intelligence Cycle.

    - Strategic Objectives.

  • 30

    Purpose of the Strategic Level, within the 4th Phase ‘ Dissemination ’, within the Threat Intelligence Cycle?

    - Addresses Long Term Objective., - Addresses Priorities.

  • 31

    What is 2nd Level of Intelligence, in the 4th Phase ‘ Dissemination ‘, within the the Threat Intelligence Cycle:

    - Operational Intelligence.

  • 32

    Purpose of the Operational Intelligence Level, within the 4th Phase ‘ Dissemination ’, within the Threat Intelligence Cycle?

    - Day to Day Priorities of I.T. ( Security Specialists/ as well as managers ), - Focused on Short term objectives.

  • 33

    What is 3rd Level of Intelligence, in the 4th Phase ‘ Dissemination ‘, within the the Threat Intelligence Cycle:

    - Tactical Intelligence.

  • 34

    Purpose of the Tactical Intelligence Level, within the 4th Phase ‘ Dissemination ’, within the Threat Intelligence Cycle?

    - Real Time ( Shortest Term Objectives ), - Intelligence that requires immediate action., - Tasks that needed to be ready yesterday.

  • 35

    Extended Purpose of the Threat Intelligence Cycle?

    - Continously improve processes., - This is a repetitive phase., - For that to happen, this requires the 5th Phase ‘ Feedback ‘, within the Threat Intelligence Cycle.

  • 36

    What is the 5th Phase within the Threat Intelligence Model?

    - Feedback.

  • 37

    Purpose of the 5th ‘ Feedback ‘ Phase, within the Threat Intelligence Cycle?

    - Not about providing feedback to you collides., - This is about., - Feeding information back into the Threat Intelligence Cycle.

  • 38

    Examples of feedback information within the 5th Phase ‘ Feedback ‘, in the Threat Intelligence Cycle?

    - New Findings, New Information., - Lessons Learned:.., - What went right, what went wrong., - Lessons learned from the previous steps., - Did you discover anything new, since last time., - Any new Threats out there?., - New Risks., - New Threats., - Something new you should be doing.

  • 39

    In Conclusion to The 5th Phase ‘ Feedback ‘, within the Threat Intelligence Cycle.

    - End phase with clear list of tasks., - For a Clear List Of People., - That are responsible for making your Threat Intelligence Cycle.

  • 40

    Reviewation of Exam Recap:

    - Know and Understand. , - All Phases of Threat Intelligence Cycle., - Possibly Questions of how., - Which activity to belonging to which phase of the cycle.