Threat Intelligence and Cybersecurity Knowledge Check
1.
Which three (3) of these were among the top 5 security drivers in 2019? (Select 3)
Partially correct!
Partially correct!
Partially correct!
2.
What was the average cost of a data breach in 2019 in US dollars?
Correct!
3.
What was the average size of a data breach in 2019?
Correct!
4.
According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as gathering data from internal, external, technical and human sources?
Correct!
5.
Crowdstrike organizes threat intelligence into which three (3) areas? (Select 3)
Partially correct!
Partially correct!
Partially correct!
6.
According to the Crowdstrike model, Endpoints, SIEMs and Firewalls belong in which intelligence area?
Correct!
7.
Which three (3) sources are recommended reading for any cybersecurity professional? (Select 3)
Partially correct!
Partially correct!
Partially correct!
8.
Which two (2) of these were among the 4 threat intelligence platforms covered in the Threat Intelligence Platforms video? (Select 2)
Partially correct!
Incorrect. Perhaps you should review the video Threat Intelligence Platforms
Comments