Book Appointment Now
Cyber Threat Intelligence Coursera Quiz Answers – Networking Funda
Table of Contents
Cyber Threat Intelligence Week 01 Quiz Answers
Quiz 01 – Threat Intelligence and Cybersecurity
Q1. Which three (3) of these were among the top 5 security drivers in 2019? (Select 3)
- IOT device attacks moving from targeting consumer electronics to targeting enterprise devices
- The number of breached records in 2019 more than 3 times that of 2018
- Human error accounting for the majority of security breaches
Q2. What was the average cost of a data breach in 2019 in US dollars?
- $3.92M
Q3. What was the average size of a data breach in 2019?
- 25,575 records
Q4. According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as gathering data from internal, external, technical and human sources?
- Collect
Q5. Crowdstrike organizes threat intelligence into which three (3) areas? (Select 3)
- Operational
- Strategic
- Tactical
Q6. According to the Crowdstrike model, Endpoints, SIEMs and Firewalls belong in which intelligence area?
- Tactical
Q7. Which three (3) sources are recommended reading for any cybersecurity professional? (Select 3)
- Trend Micro
- BleepingComputer
- DarkReading
Q8. Which two (2) of these were among the 4 threat intelligence platforms covered in the Threat Intelligence Platforms video? (Select 2)
- Recorded Future
- FireEye
Threat Intelligence Framework
Q1. True or False. The average enterprise has 85 different security tools from 45 vendors.
- True
Q2. Which threat intelligence framework can be described as a system that is effective if there are only 2 players and the adversary is motivated by socioeconomic or sociopolitical payoffs?
- Diamond Model of Intrusion Analysis
Q3. True or False. An organization’s security immune system should not be considered fully integrated until it is integrated with the extended partner ecosystem.
- True
Q4. Which term can be defined as “The real-time collection, normalization, and analysis of the data generated by users, applications, and infrastructure that impacts the IT security and risk posture of an enterprise” ?
- Security Intelligence
Q5. What are the three (3) pillars of effective threat detection? (Select 3)
- Become proactive
- See everything
- Automate intelligence
Q6. True or False. According to the FireEye Mandiant’s Security Effectiveness Report 2020, organizations have an average of 50-70 security tools in their IT environments.
- True
Quiz 02 – Threat Intelligence Graded Assessment
Q1. Which three (3) of these were among the top 5 security drivers in 2019? (Select 3)
- A significant skills gap exists with more new cybersecurity professional needed the total number currently working in this field
- IOT device attacks moving from targeting consumer electronics to targeting enterprise devices
- Factors such as cloud migration and IT complexity act as cost multipliers making new breaches increasingly expensive
Q2. What was the average time to identify and contain a breach in 2019?
- 279 days
Q3. Which industry had the highest average cost per breach in 2019 at $6.45M
- Healthcare
Q4. Breaches caused by which source resulted in the highest cost per incident in 2019?
- Credentials theft
Q5. According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as normalize, correlate, confirm and enrich the data?
- Process
Q6. According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as investigate, contain, remediate and prioritize?
- Analyze
Q7. According to the Crowdstrike model, threat hunters, vulnerability management and incident response belong in which intelligence area?
- Operational
Q8. Which three (3) sources are recommended reading for any cybersecurity professional? (Select 3)
- X-Force Exchange
- Krebs on Security
- InfoSecurity Magazine
Q9. Which two (2) of these were among the 4 threat intelligence platforms covered in the Threat Intelligence Platforms video? (Select 2)
- IBM X-Force Exchange
- TruSTAR
Q10. Which threat intelligence framework is divided into 3 levels. Level one is getting to know your adversaries. Level 2 involves mapping intelligence yourself and level 3 where you map more information and used that to plan your defense?
- Mitre Att&ck Knowledgebase
Q11. True or False. An organization’s security immune system should be isolated from outside organizations, including vendors and other third parties to keep it from being compromised.
- False
Q12. Activities performed as a part of security intelligence can be divided into pre-exploit and post-exploit activities. Which two (2) of these are pre-exploit activities? (Select 2)
- Detect deviations from the norm that indicate early warnings of APTs
- Prioritize vulnerabilities to optimize remediation processes and close critical exposures
Q13. True or False. According to the FireEye Mandiant’s Security Effectiveness Report 2020, more that 50% of successful attacks are able to infiltrate without detection.
- True
Cyber Threat Intelligence Week 02 Quiz Answers
Quiz 01 – Data Security and Protection
Q1. A student’s grades should be visible to that student when she logs in to her university account. Her ability to see her grades is an example of which aspect of the CIA Triad?
- Availability
Q2. A university has implemented practices that ensure all student data is encrypted while stored on university servers. Which aspect of the CIA Triad does this practice support?
- Confidentiality
Q3. The Student Portal of a university issues a confirmation code with a hash value each time a student submits an assignment using the portal. This is an example of which aspect of the CIA Triad?
- Integrity
Q4. True or False. An organization has “air-gapped” its small network of critical data servers so they are accessible internally but not to any external system. These systems are now safe from a deliberate attack.
- False
Q5. C-level executives face 4 challenges when assuring their organizations maintain a comprehensive, workable data security solution. The proliferation of smartphones used for work would impact which two (2) of these concerns the most? (Select 2)
- Explosive data growth
- New privacy regulations
Q6. True or False. An organization is subject to both GDPR and PCI-DSS data security regulations and has dedicated all of its efforts in remaining in compliance with these 2 sets of regulations. They are correct in believing that their data is safe.
- False
Q7. True or False. A newly hired CISO made the right choice when he moved the Known Vulnerabilities list to a high priority for his team to resolve even though none of these had ever been exploited on the company’s network to date.
- True
Q8. All industries have their own unique data security challenges. Which of these industries has a particular concern with HIPAA compliance and the highest cost per breached record?
- Healthcare
Q9. All industries have their own unique data security challenges. Which of these industries has a particular concern with being targeted more than any other by cybercriminals “because that is where the money is”?
- Financial
Q10. Which three (3) of these are among the top 12 capabilities that a good data security and protection solution should provide? (Select 3)
- Data discovery
- Data risk analysis
- Blocking, masking and quarantining
Q11. Parsing discovered data against known patterns or keywords is a process known as what?
- Data classification
Q12. Which data protection process takes data activity monitoring output and uses it to generate insights about threats?
- Active analytics
Q13. True or False. The Guardium administrator needs to be someone with the highest level of access to the data being protected?
- False
Mobile Endpoint Protection
Q1. Which mobile operating system runs the majority of smartphones today?
- iOS
- Android
Q2. Which mobile operating system runs approximately 60% of tablet computers worldwide?
- iOS
Q3. True or False. Security is enhanced on iOS mobile devices because users typically cannot interact directly with the operating system.
- True
Q4. Which statement best describes the use of anti-virus software on mobile devices?
- Antivirus software can “see” the apps that are running on a mobile device but cannot see the data that is associated with each app.
Q5. Which type of threat is Jailbreaking?
- System based
Quiz 02 – Data Loss Prevention and Mobile Endpoint Protection Graded Assessment
Q1. Which mobile operating system was originally based on the Linux kernel?
- Android
Q2. Which two (2) is mobile operating combined dominate the vast majority of the smartphone market? (Select 2)
- iOS
- Android
Q3. True or False. Security is enhanced on Android mobile devices because users interact directly with the operating system.
- False
Q4. What is one limitation to the operation of anti-virus software running on mobile devices?
- Antivirus software can “see” the apps that are running on a mobile device but cannot see the data that is associated with each app.
Q5. On a mobile device, which type of threat is a phishing scam?
- App based
Q6. A university uses clustered servers to make sure students will always be able to submit their assignments even if one server is down for maintenance. Server clustering enables which aspect of the CIA Triad?
- Availability
Q7. A university has enabled WPA2 encryption on its WiFi systems throughout the campus. Which aspect of the CIA Triad is directly supported by this action?
- Confidentiality
Q8. A student can see her grades via her school’s Student Portal but is unable to change them. This restriction is in support of which aspect of the CIA Triad?
- Integrity
Q9. True or False. An operator who corrupts data by mistake is considered an “inadvertent attack” that should be considered when developing data protection plans.
- True
Q10. C-level executives face 4 challenges when assuring their organizations maintain a comprehensive and workable data security solution. GDPR, CCPA, and PCC-DSS are concerned with which one of these challenges?
- New privacy regulations
Q11. True of False. A biotech research company with a very profitable product line has grown so rapidly it has acquired a marketing company, a small IT services company and a company that specializes in pharmaceutical manufacturing and distribution. The CEO of the parent company made a good decision when he decided not to consolidate all data security under a single CISO, believing that each of the new divisions understands its own data security needs better than the parent company possibly could.
- False
Q12. Which three (3) of these are among the 5 common pitfalls of data security? (Select 3)
- Failure to move beyond compliance
- Failure to address known vulnerabilities
- Failure to prioritize and leverage data activity monitoring
Q13. All industries have their own unique data security challenges. Which of these industries has a particular concern with a widely distributed IT infrastructure that must provide services across multiple government jurisdictions while not violating the privacy concerns of its users?
- Transportation
Q14. Which three (3) of these are among the top 12 capabilities that a good data security and protection solution should provide? (Select 3)
- Data and file monitoring
- Data classification
- Encryption
Q15. Which is the data protection process that addresses inappropriate privileges, insecure authentication methods, account sharing, configuration files and missing security patches?
- Vulnerability assessment
Q16. Which data protection process substitutes key data with a token that is issued by a trusted third-party where the token can be accessed but not redeemed by an untrusted party?
- Tokenization
Q17. IBM Guardium provides heterogeneous data source support. This support results in which capability?
- Similar security capabilities can be applied to different sort of data repositories
Cyber Threat Intelligence Week 03 Quiz Answers
Quiz 01 – Vulnerability Tools
Q1. Which component of a vulnerability scanner would perform security checks according to its installed plug-ins?
- Engine Scanner
Q2. Which component of a vulnerability scanner stores vulnerability information and scan results?
- Database
Q3. How does a vulnerability scanner detect internal threats?
- By scanning hosts
Q4. In which component of a Common Vulnerability Score (CVSS) would the attack vector be reflected?
- Base-Exploitability Subscore
Q5. In which component of a Common Vulnerability Score (CVSS) would confidentiality be reflected?
- Base-Impact Subscore
Q6. In which component of a Common Vulnerability Score (CVSS) would exploit code maturity be reflected?
- Temporal Score
Q7. In which component of a Common Vulnerability Score (CVSS) would security requirements subscore be reflected?
- Environmental Score
Q8. True or False. The US Dept of Defense has produced a number of Security Technical Implementation Guides to show the most secure ways to deploy common software packages such as operation systems, open source software, and network devices. These guides are available to the public and can be freely downloaded.
- True
Q9). The Center for Internet Security (CIS) has implementation groups that rank from the least secure to the most secure. Which of these has the least stringent security requirements?
- CIS Sub-Controls for small, commercial off-the-shelf or home office software environments.
Port Scanning
Q1. Which three (3) of these is identified by a basic port scanner? (Select 3)
- Available services provided by the target system
- A list of Open ports on a target system
- Active hosts using TCP
Q2. Port numbers 49151 through 65536 are known as what?
- Dynamic and Private Ports
Q3. What are the three (3) responses a port scanner might receive when it is scanning a system for open ports? (Select 3)
- Closed
- Filtered (or blocked)
- Open
Q4. Which type of scan is commonly used to check if a working system is at the address indicated and that it is responding?
- Ping (ICMP Echo Request)
Q5. Which type of scan sends an empty packet or packet with a different payload for each port scanned. A response is received only for closed ports?
- UDP port scan
Network Protocol Analyzers
Q1. Which two (2) of these are other names for a protocol analyzer? (Select 2)
- Network analyzer
- Packet analyzer
Q2. Which is the most popular packet sniffer used?
- WireShark
Vulnerability Assessment Tools Graded Assessment
Q1. Which of these is identified by a basic port scanner?
- Open ports
Q2. Port numbers 0 through 1023 are known as what?
- Well known ports
Q3. If a port is blocked, what response will be sent to the port scanner?
- There will be no response
Q4. Which type of scan notes the connection but leaves the target hanging, i.e. does not reveal any information to the target about the host that initiated the scan?
- TCP/Half Open Scan (aka a SYN scan)
Q5. Which two (2) of these are other names for a protocol analyzer? (Select 2)
- Sniffer
- Traffic analyzer
Q6. True or False. Packet sniffers are used by hackers but have no legitimate place in legitimate network management.
- False
Q7. Which component of a vulnerability scanner provides high-level graphs and trend reports for executive leadership?
- Report Module
Q8. How does a vulnerability scanner detect external threats?
- By scanning internet facing hosts from the Internet
Q9. What are the three (3) components that make up the overall Common Vulnerability Score (CVSS)? (Select 3)
- Base
- Environmental
- Temporal
Q10. In which component of a Common Vulnerability Score (CVSS) would attack complexity be reflected?
- Base-Exploitability Subscore
Q11. In which component of a Common Vulnerability Score (CVSS) would integrity be reflected?
- Base-Impact Subscore
Q12. In which component of a Common Vulnerability Score (CVSS) would remediation level be reflected?
- Temporal Score
Q13. In which component of a Common Vulnerability Score (CVSS) would impact subscore be reflected?
- Environmental Score
Q14. True or False. The US Dept of Defense has produced a number of Security Technical Implementation Guides to show the most secure ways to deploy common software packages such as operation systems, open source software, and network devices. These guides are restricted to use by US military agencies only.
- False
Q15. The Center for Internet Security (CIS) has implementation groups that rank from the least secure to the most secure. Which of these are required to meet the middle level of security?
- “a” and “b” only
Security Architecture Considerations
Q1. True or False. A security architect’s job is to make sure that security considerations dominate other design aspects such as usability, resilience and cost.
- False
Q2. Which of these is an aspect of an Enterprise Architecture?
- Considers the needs of the entire organization
Q3. Which of these is an aspect of Solution Architecture?
- Describes how specific products or technologies are used
Q4. Which three (3) of these are general features of Building Blocks? (Select 3)
- Could be an actor, business service, application or data
- Package of function defined to meet a business need
- Defined boundary, but can work with other building blocks
Q5. Which three (3) of these are Architecture Building Blocks (ABBs)? (Select 3)
- Identity and Access Management
- Application Security
- Data Security
Q6. Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3)
- HSM
- Certificate Authority
- Key Security Manager
Q7. The diagram below shows which type of architecture?
- Enterprise Security Architecture
Q8. Solution architectures often contain diagrams like the one below. What does this diagram show?
- Architecture overview
Q9. Insecurity architecture, a reusable solution to a commonly recurring problem is known as what?
- A pattern
Application Security Techniques and Risks
Q1. Which of these is an application security threat?
- Malware
Q2. Failure to use input validation in your application introduces what?
- A vulnerability
Q3. Which software development lifecycle is characterized as a top-down approach where one stage of the project is completed before the next stage begins?
- Waterfall
Q4. Which form of penetration testing allows the testers complete knowledge of the systems they are trying to penetrate in advance of their attack to simulate an internal attack from a knowledgeable insider?
- White Box testing
Q5. Which application testing method requires access to the original application source code?
- SAST: Static Application Security Testing
Q6. Which three (3) steps are part of a Supplier Risk Assessment? (Select 3)
- Determine the likelihood the risk would interrupt the business
- Identify how any risks would impact your organization’s business
- Identify how the risk would impact the business
Q7. What type of firewall should you install to protect applications used by your organization from hacking?
- A web application firewall (WAF)
Q8. Which type of application attack would include Elevation of privilege, data tampering and luring attacks?
- Authorization
Q9. Which type of application attack would include information disclosure and denial of service?
- Exception management
Q10. Which one of the OWASP Top 10 Application Security Risks would be occur when untrusted data is sent to an interpreter as part of a command or query?
- Injection
Q11. Which one of the OWASP Top 10 Application Security Risks would occur when a poorly configured XML processor evaluates an external entity reference within an XML document allowing the external entity to expose internal files?
- XML external entities (XXE)
Q12. Which of these threat modeling methodologies was introduced in 1999 at Microsoft to provide their developer’s a mnemonic that would help them find security vulnerabilities in their products?
- STRIDE
Q13. Security standards do not have the force of law but security regulations do. Which one of these is a security regulation?
- Gramm-Leach-Bliley Act
DevSecOps & Security Automation
Q1. Which phase of DevSecOps would contain the activities Threat modeling & risk analysis, Security backlog and Architecture & design?
- Plan
Q2. Which phase of DevSecOps would contain the activities Continuous component control, Application and infrastructure orchestration, and Data cleansing & retention?
- Release, deploy & decommission
Q3. The Release step in the DevSecOps Release, Deploy & Decommission phase contains which of these activities?
- Versioning of infrastructure
Q4. The Detect & Visualize step in the DevSecOps Operate & Monitor phase contains which of these activities?
- Inventory
Deep Dive into Cross-Scripting
Q1. True or False. Finding a bug in a software product from a major vendor can be very profitable for a security researcher.
- True
Q2. Which is the top vulnerability found in common security products?
- Cross-site scripting
Q3. True or False. Building software defenses into your software includes: input validation, output sensitization, strong encryption, strong authentication and authorization.
- True
Q4. Complete the following statement. Cross-site scripting ____
- allows attackers to inject client-side scripts into a web page.
Q5. True or False. A Stored XSS attack is potentially far more dangerous than a Reflected XSS attack.
- True
Q6. Cross-site scripting attacks can be minimized by using HTML and URL Encoding. How would a browser display this string?: <b>Test</b>
- <b>Test</b>
Q7. Which is the most effective means of validating user input?
- Whitelisting
Quiz 02 – Application Testing Graded Assessment
Q1. True or False. A security architect’s job is to make sure that security considerations are balanced against other design aspects such as usability, resilience, and cost.
- True
Q2. Which of these is an aspect of an Enterprise Architecture?
- Maps the main components of a problem space and solution at a very high level.
Q3. Which of these is an aspect of a Solution Architecture?
- Shows the internal data and use of reusable or off-the-shelf components
Q4. Which three (3) of these are features of Architecture Building Blocks (ABBs) ? (Select 3)
- Product and vendor neutral
- Guides the development of a Solution Architecture
- Captures and defines requirements such as function, data, and application
Q5. Which three (3) of these are Architecture Building Blocks (ABBs)? (Select 3)
- Detect and Respond
- Infrastructure and Endpoint Security
- Identity and Access Management
Q6. Which three (3) of these are Solution Building Blocks (SBBs) ? (Select 3)
- Hardware Token
- Privilege Access Manager
- Web Application Firewall (WAF)
Q7. The diagram below shows which level of architecture?
- Enterprise Security Architecture
Q8. Solution architectures often contain diagrams like the one below. What does this diagram show?
- Solution architecture overview
Q9. Solution architectures often contain diagrams like the one below. What does this diagram show?
- External context and boundary diagram
Q10. What is lacking in a security architecture pattern that prevents it from being used as a finished design?
- The context of the project at hand
Q11. What are the possible consequences if a bug in your application becomes known?
- All of the above
Q12. What was the ultimate consequence to Target Stores in the United States from their 2013 data breach in which over 100M records were stolen?
- Costs and fines estimated at $1B.
Q13. Select the two (2) top vulnerabilities found in common security products. (Select 2)
- Cross-site scripting
- Cross-site request forgery
Q14. True or False. If you can isolate your product from the Internet, it is safe from being hacked.
- False
Q15. Which three (3) things can Cross-site scripting be used for? (Select 3)
- Steal cookies
- Harvest credentials
- Take over sessions
Q16. True or False. Commonly a Reflect XSS attack is sent as part of an Email or a malicious link and affects only the the user who receives the email or link.
- True
Q17. Cross-site scripting attacks can be minimized by using HTML and URL Encoding. How would a browser display this string?
- <b>Password</b>
Q18. Which three (3) statements about whitelisting user input are true? (Select 3)
- Whenever possible, input should be whitelisted to alphanumeric values to prevent XSS
- Whitelisting reduces the attack surface to a known quantity
- Special characters should only be allowed on an exception basis
Q19. Which two (2) statements are considered good practice for avoiding XSS attacks (Select 2)
- Encode all data output as part of HTML and JavaScript
- Use strict whitelists on accepting input
Q20. How would you classify a hactivist group who thinks that your company’s stance on climate change threatens the survival of the planet?
- A threat
Q21. Which software development lifecycle is characterized by short bursts of analysis, design, coding and testing during a series of 1 to 4 week sprints?
- Agile and Scrum
Q22. Which software development lifecycle is characterized by a series of cycles and an emphasis on security?
- Spiral
Q23. Which form of penetration testing allows the testers no knowledge of the systems they are trying to penetrate in advance of their attack to simulate an external attack by hackers with no knowledge of an organizations systems?
- Black Box Testing
Q24. Which application testing method requires a URL to the application, is quick and cheap but also produces the most false-positive results?
- DAST: Dynamic Security Application Testing
Q25. Which type of application attack would include buffer overflow, cross-site scripting, and SQL injection?
- Input validation
Q26. Which type of application attack would include unauthorized access to configuration stores, unauthorized access to administration interfaces and over-privileged process and service accounts?
- Configuration management
Q27. Which one of the OWASP Top 10 Application Security Risks would be occur when authentication and session management functions are implemented incorrectly allowing attackers to compromise passwords, keys or session tokens.
- Broken authentication
Q28. Which one of the OWASP Top 10 Application Security Risks would be occur when restrictions on what a user is allowed to do is not properly enforced?
- Broken access control
Q29. Which of these threat modeling methodologies is integrated seamlessly into an Agile development methodology?
- VAST
Q30. Security standards do not have the force of law but security regulations do. Which one of these is a security regulation?
- HIPAA
Q31. Which phase of DevSecOps would contain the activities Secure application code, Secure infrastructure configuration, and OSS/COTS validation?
- Code & build
Q32. Which phase of DevSecOps would contain the activities Detect & Visualize, Respond, and Recover?
- Operate & monitor
Q33. The Deploy step in the DevSecOps Release, Deploy & Decommission phase contains which of these activities?
- Creation of Immutable images
Q34. The Respond step in the DevSecOps Operate & Monitor phase contains which of these activities?
- Virtual Patching
Cyber Threat Intelligence Week 04 Quiz Answers
Quiz 01 – SIEM Concepts
Q1. Which three (3) of the following are core functions of a SIEM? (Select 3)
- Manages network security by monitoring flows and events
- Consolidates log events and network flow data from thousands of devices, endpoints and applications distributed throughout a network
- Collects logs and other security documentation for analysis
Q2. True or False. SIEMs capture network flow data in near real time and apply advanced analytics to reveal security offenses.
- True
Q3. Which of these describes the process of data normalization in a SIEM?
- Turns raw data into a format that has fields that SIEM can use
Q4. True or False. A SIEM considers any event that is anomalous, or outside the norm, to be an offense.
- True
Q5. True or False. A large company might have QRadar event collectors in each of their data centers that are configured to forward all collected events to a central event processor for analysis.
- True
Q6. The triad of a security operations centers (SOC) is people, process and technology. Which part of the triad would vendor-specific training belong?
- People
Artificial Intelligence in SIEMs
Q1. True or False. Information is often overlooked simply because the security analysts do not know how it is connected.
- True
Q2. The partnership between security analysts and technology can be said to be grouped into 3 domains, human expertise, security analytics and artificial intelligence. The human expertise domain would contain which three (3) of these topics?
- Morals
- Generalization
- Common sense
Q3. A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for abstraction?
- Human expertise
Quiz 02 – SIEM Platforms Graded Assessment
Q1. True or False. SIEMs can be available on premises and in a cloud environment.
- True
Q2. For a SIEM, what are logs of specific actions such as user logins referred to?
- Events
Q3. Which of these describes the process of data normalization in a SIEM?
- Indexes data records for fast searching and sorting
Q4. When a data stream entering a SIEM exceeds the volume it is licensed to handle, what are three (3) ways the excess data is commonly handled, depending upon the terms of the license agreement? (Select 3)
- The excess data is stored in a queue until it can be processed
- The excess data is dropped
- The data stream is throttled to accept only the amount allowed by the license
Q5. Which five (5) event properties must match before the event will be coalesced with other events? (Select 5)
- Username
- QID
- Source IP
- Destination Port
- Destination IP
Q6. What is the goal of SIEM tuning?
- To get the SIEM to sort out all false-positive offenses so only those that need to be investigated are presented to the investigators
Q7. True or False. QRadar event collectors send all raw event data to the central event processor for all data handling such as data normalization and event coalescence.
- False
Q8. The triad of a security operations centers (SOC) is people, process and technology. Which part of the triad would containment belong to?
- Process
Q9. True or False. There is a natural tendency for security analysts to choose to work on cases that they are familiar with and to ignore those that may be important but for which they have no experience.
- True
Q10. The partnership between security analysts and technology can be said to be grouped into 3 domains, human expertise, security analytics and artificial intelligence. The security analytics domain contains which three (3) of these topics ?
- Anomaly detection
- Pattern identification
- Data correlation
Q11. A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for data visualization?
- Security analytics
Cyber Threat Intelligence Week 05 Quiz Answers
Quiz 01 – Threat Hunting Overview
Q1. Cyber threats pose many challenges to organizations today. Which three (3) of these are among those cited? (Select 3)
- It takes an average of 191 days to even detect an attack has occurred
- Almost half of the breaches are caused by malicious or criminal acts
- There is a cybersecurity skills shortage
Q2. What percent of security leaders reported that threat hunting increased the speed and accuracy of response in detection of advanced threats?
- 91%
Q3. While 80% of the threats are known and detected, the 20% that remains unknown account for what percent of the damage?
- 80%
Q4. True or False. The skill set of a cyber threat hunter is very different from that of a cybersecurity analyst and many threat hunters a have backrounds doing intelligence work.
- True
Q5. Your enemy uses a cyber kill chain to plan and execute his attack against your organization. Which three (3) of these are steps in a cyber kill chain? (Select 3)
- Weaponization
- Delivery
- Reconnaissance
Q6. True or False. A cyber threat hunting team generally sits at the center of the SOC Command Center.
- False
Q7. There is value brought by each of the IBM i2 EIA use cases. Which one of these delivers net new discovery of correlating low level alerts and offenses?
- Cyber Threat Hunting
Quiz 02 – Threat Hunting Graded Assignment
Q1. What is one thing that makes cybersecurity threats so challenging to deal with?
- There is a big shortage in cyber security skills and many job openings unfilled
Q2. The level 3 and 4 cybersecurity analysts working in a Security Operations Center (SOC) combat cyber crime by performing which type of activity?
- Cyber forensic investigations
Q3. True or False. If you have no better place to start hunting threats, start with a view of your own organization then work your way up to an industry view and then a regional view, a national view and finally a global view of the threat landscape.
- False
Q4. Your enemy uses a cyber kill chain to plan and execute his attack against your organization. Which three (3) of these are steps in a cyber kill chain?
- Installation
- Delivery
- Exploitation
Q5. True or False. A cyber threat hunting team generally sits outside the SOC command center.
- True
Q6. There is value brought by each of the IBM i2 EIA use cases. Which one of these identifies net new money chain transfers?
- Fraud Investigations
Next Course Quiz Answers >>
Cybersecurity Capstone: Breach Response Case Studies
<< Previous Course Quiz Answers
Penetration Testing, Incident Response, and Forensics
All Course Quiz Answers of IBM Cybersecurity Analyst Professional Certificate
Course 01: Introduction to Cybersecurity Tools & Cyber Attacks
Course 02: Cybersecurity Roles, Processes & Operating System Security
Course 03: Cybersecurity Compliance Framework & System Administration
Course 04: Network Security & Database Vulnerabilities
Course 05: Penetration Testing, Incident Response, and Forensics
Course 06: Cyber Threat Intelligence
Course 07: Cybersecurity Capstone: Breach Response Case Studies
Course 08: IBM Cybersecurity Analyst Assessment