Wednesday , December 11 2024
Breaking News

IBM Getting Started with Threat Intelligence and Hunting Answers

Getting Started with Threat Intelligence and Hunting Answers

This course is intended to assist individuals with an active interest in understanding the concepts related to the adoption of cybersecurity hardening practices within the enterprise, the course provides an inside view of the roles, technologies, and processes security teams adopt to tackle real-world cyber-attacks and insider threats affecting companies in all major industries across the globe today.

Quiz 1 Answers :

Which of the following motivators explain why cyber criminals carry out cyber-attacks?

  • Hacktivism
  • All the above—-
  • Espionage
  • Options A and C Only
  • Financial Gain

What is the chief weapon of a cyber attacker?

  • Phishing
  • Malware—
  • SQLi
  • Brute Force
  • Physical Access

Which of the following examples best illustrates a cyber threat?

  • You receive an email from an unknown account asking you to click on a link to claim a prize.
  • Options B and C Only—-
  • friend uses your Netflix login information without your knowledge
  • Hackers infiltrate a banking website and obtain customer account information
  • All of the Above

Why are cyber-attacks significant for established companies?

  • The cost to businesses from cyber-attacks and their consequences, such as data breaches, are always affordable but exposes the company to internal inefficiencies which causes delays.–
  • All the above
  • Invites regulatory penalties.
  • Enhances the brand reputation and increases customer loyalty.

The use of a cyber-attack for research purposes, such as probing potential vulnerabilities within a company’s network or conducting penetration testing, is known as:

  • Code Red Hacking
  • White Hat Hacking—
  • Benign Hacking
  • Hacktivism

Based on the IBM X-Force report “The shifting panorama of global cybercrime”, what is the biggest motivation for cybercriminals to attack companies around the world?

  • Espionage
  • Terrorism
  • Financial gain–
  • Hacktivism

What is true about misconfiguration as one of the most challenging types of cyber threats?

  • Options ‘A’ and ‘C’ Only–
  • Erroneous permission-level attribution on cloud services and networked backups exposed sensitive data through weak or non-existent authentication.–
  • Incidents where attackers gain access to vulnerable systems left exposed by inexperienced administrators or users (e.g., default factory settings)
  • All the above
  • Employees and insiders falling for phishing emails that resulted in account takeover or access to sensitive data.

Match the attack type with its description.

[Select Two] Why is it important to create an integrated security domain system?

  • The security portfolio structured around domains presents a less organized fashion to make sense of threats using logs, data, threats, flows, packets, etc.
  • Because it involves the partner ecosystem that allows collaboration across companies and competitors, to understand global threats and data, and adapt to new threats.–
  • Because the traditional defense strategy is not to layer on another point-product tool or technology to an already fragmented and disjointed IT environment.
  • Costly and complex fragmented security capabilities provide the visibility and coordination needed to stop today’s sophisticated attacks.–
  • Until recently, organizations have responded to security concerns by deploying a new tool to address each new risk. We’ve observed one company was using 85 tools from 45 different software vendors! Now they have to install, configure, manage, patch, upgrade, and pay for dozens of non-integrated solutions with limited views of the landscape.

Quiz 2 Answers :

The attack begins when the cyber bad actor launches and executes the attack.

  • True
  • False

Which are the five phases for the Cyber Resilience Lifecycle based in NIST CSF?

  • Investigate, Remediate, Protect, Recover, Take legal action
  • None of the above
  • Identify, Protect, Detect, Respond, Recover
  • Identify, Investigate, Remediate, Respond, Rework

Threat hunting requires a great deal of skill, concentration, collaboration, and more than a little creativity. These are the areas where the human mind excels. But threat hunting also requires the right technology to sift intelligence from a vast seat of data, spot anomalies in system logs and automate the process using a global network of threat intelligence.

  • True
  • False

[Select all that apply] Which of the following stressors are known to overwhelm cyber security personnel? Overloaded by data Shortage of skills to fill the needed positions Underpaid versus developers Dealing with unaddressed threats

  • Overloaded by data
  • Shortage of skills to fill the needed positions
  • Underpaid versus developers
  • Dealing with unaddressed threats

Cyber Threat Hunting is the act of proactively and aggressively intercepting, tracking and eliminating cyber adversaries as early as possible in the Cyber Kill Chain. 

  • True
  • False

In cyber resilience the business priority is to support “continuous availability”, the expectation is of always-on systems with zero downtime, and at the same time, our systems are more heterogeneous than ever. Which technologies will be critical to solving this expectation and complexity?

  • Orchestration as part of a software-defined resiliency story
  • Artificial Intelligence
  • Predictive systems
  • All of the above

The X-Force IRIS Cyber Attack Framework is composed of a Preparation Framework and an Execution Framework. 

  • True
  • False

Quiz 3 Answers :

The purpose of following reports is to ____________________. 

  • be notified when something new changes in reports without having to check in manually
  • make sure you’ve checked in to watch what is happening in the reports
  •  Both A and B

How do you monitor any changes in a  report? 

  • Click the “Follow” button.
  • Click the next arrow to go to the report
  • None of the above
  • Reports can’t be monitored

With X-Force Exchange, we can monitor the online environment, in real-time, and actively follow known security issues. 

  • True
  • False

In what folder can we find the many reports that contain active ransomware? 

  • WannaCry Collections Folder
  • Ransomware Folder
  • X-Force Exchange Folder
  • Botnet Reports Folder

What is true about the Threat Activity Map? 

  • It gives a visual of different countries that have been attacked.
  • None of the above
  • It finds the location of what PC the attacks are coming from.
  • It shows a list of IP addresses that have been affected by spam attacks

About Clear My Certification

Check Also

ESL003: Upper-Intermediate English as a Second Language Exam Answers

ESL003: Upper-Intermediate English as a Second Language Exam Answers Learning a new language requires you …

Leave a Reply

Your email address will not be published. Required fields are marked *