Quiz - The Threat Landscape

Module 2: The Threat Landscape Quiz Answers

Which definition best represents the Cyber Kill Chain?

Which bad actor type is motivated by notoriety?

Which bad actor type is motivated by ideology?

Which system or organization assigns a severity score to help you identify the most dangerous cyberthreats to your organization?

Which standard develops a common language for cyberthreat information?

Which two attack vector categories characterize a ransomware attack? (Choose two.)

What are the two ingredients of a successful social engineering attack? (Choose two.)

Which step is the final action in the threat intelligence process?

Which expression would best qualify as threat intelligence?

Which bad actor type prefers ransomware as an attack method?

What is a benefit of using MITRE ATT@CK?

Which sequence of a Cyber Kill Chain show the events occurring in the correct order?

Manipulating people to do something contrary to their interests is an example of which cybersecurity threat category?

Which three requisite qualities must information have for it to be threat intelligence? (Choose three.)

Which cybersecurity threat category would a trojan horse be an example of?

Which hacker type is someone employed by a computer security consulting firm who could be hired to do penetration testing?