Friday , December 20 2024
Breaking News

Fortinet The Threat Landscape Quiz Answers

Module 2: The Threat Landscape Quiz Answers

Which definition best represents the Cyber Kill Chain?

  • Chronicles the chain reaction of a cyber attack
  • Details how to respond at each stage of a cyber attack
  • Describes the stages of a cyber attack
  • Illustrates how a cyber attack is killed

Which bad actor type is motivated by notoriety?

  • Explorer
  • Cyber terrorist
  • Cybercriminal
  • Adventurer

Which bad actor type is motivated by ideology?

  • Hacktivist
  • Cyber ideologue
  • Cyber warrior
  • Explorer

Which system or organization assigns a severity score to help you identify the most dangerous cyberthreats to your organization?

  • Federal Bureau of Investigation (FBI)
  • Cyberthreat rating system unanimous (CRSU)
  • National Institute of Standards and Technology (NIST)
  • Common vulnerability scoring system (CVSS)

Which standard develops a common language for cyberthreat information?

  • Structured threat information expression (STIX)
  • MITRE ATT&CK
  • Common vulnerability scoring system (CVSS)
  • Cyberthreats vernacular (CTV)

Which two attack vector categories characterize a ransomware attack? (Choose two.)

  • Computer technology
  • Pre-exploit
  • Post-exploit
  • Human

What are the two ingredients of a successful social engineering attack? (Choose two.)

  • Gaining the trust of the victim
  • Denying the victim access to a server or service
  • Compelling the victim to act, such as instilling a sense of urgency
  • Stealing the victim’s credentials by watching them as they log in
  • Breaching the victim’s computer by exploiting a weakness in an application

Which step is the final action in the threat intelligence process?

  • Identifying which threats must be mitigated
  • Providing feedback and a review of lessons learned
  • Eliminating threats
  • Disseminating threat information

Which expression would best qualify as threat intelligence?

  • A list of malicious IP addresses and domain names
  • Security implications and actionable advice
  • News of a cyberattack on another organization’s network
  • Data feeds from a Security Information and Event Manager (SIEM)

Which bad actor type prefers ransomware as an attack method?

  • Cyber extortionist
  • Cyber terrorist
  • Cybercriminal
  • Cyber warrior

What is a benefit of using MITRE ATT@CK?

  • Provides a common taxonomy for understanding and mitigating cyberattacks
  • Supplies superior services at a lower cost than its competitors
  • Presents more cyber attack details than other methods, such as Cyber Kill Chain
  • Offers off-the-shelf security software solutions

Which sequence of a Cyber Kill Chain show the events occurring in the correct order?

  • Reconnaissance, delivery, weaponization, exploitation, installation, command and control, exfiltration
  • Weaponization, reconnaissance, delivery, exploitation, installation, command and control, exfiltration
  • Weaponization, reconnaissance, delivery, installation, exploitation, command and control, exfiltration
  • Reconnaissance, weaponization, delivery, exploitation, installation, command and control, exfiltration

Manipulating people to do something contrary to their interests is an example of which cybersecurity threat category?

  • Malware
  • System design failure
  • Social engineering
  • Unauthorized access

Which three requisite qualities must information have for it to be threat intelligence? (Choose three.)

  • Detailed
  • Contextual
  • Actionable
  • Timely
  • Relevant

Which cybersecurity threat category would a trojan horse be an example of?

  • Malware
  • Unauthorized access
  • Social engineering
  • System design failure

Which hacker type is someone employed by a computer security consulting firm who could be hired to do penetration testing?

  • Green hat
  • Black hat
  • Grey hat
  • Blue hat

FCF – Introduction to the Threat Landscape 2.0 Self-Paced – Module 2: The Threat Landscape Quiz Answers

Module 1: Introduction to Cybersecurity Quiz Answers

Module 2: The Threat Landscape Quiz Answers

Module 3: Social Engineering Quiz Answers

Module 4: Malware Quiz Answers

About Clear My Certification

Check Also

Information Technology Management Professional CertificatioN

Information Technology Management Professional Certification

Information Technology Management Professional Certification Information Technology Management involves overseeing and directing the use of …

Leave a Reply

Your email address will not be published. Required fields are marked *