Threat Intelligence Graded Assessment
1.
Which three (3) of these were among the top 5 security drivers in 2019? (Select 3)
Partially correct!
Partially correct!
Partially correct!
2.
What was the average time to identify and contain a breach in 2019?
Correct!
3.
Which industry had the highest average cost per breach in 2019 at $6.45M
Correct!
4.
Breaches caused by which source resulted in the highest cost per incident in 2019?
Correct!
5.
According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as normalize, correlate, confirm and enrich the data?
Correct!
6.
According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as investigate, contain, remediate and prioritize?
Correct!
7.
According to the Crowdstrike model, threat hunters, vulnerability management and incident response belong in which intelligence area?
Correct!
8.
Which three (3) sources are recommended reading for any cybersecurity professional? (Select 3)
Partially correct!
Partially correct!
Partially correct!
9.
Which two (2) of these were among the 4 threat intelligence platforms covered in the Threat Intelligence Platforms video? (Select 2)
Partially correct!
Partially correct!
10.
Which threat intelligence framework is divided into 3 levels. Level 1 is getting to know your adversaries. Level 2 involves mapping intelligence yourself and level 3 where you map more information and use that to plan your defense?
Correct!
11.
True or False. An organization's security immune system should be isolated from outside organizations, including vendors and other third-parties to keep it from being compromised.
Correct!
12.
Activities performed as a part of security intelligence can be divided into pre-exploit and post-exploit activities. Which two (2) of these are pre-exploit activities? (Select 2)
Partially correct!
Partially correct!
13.
True or False. According to the FireEye Mandiant's Security Effectiveness Report 2020, more that 50% of successful attacks are able to infiltrate without detection.
Correct!
Comments