CS0-002 - CompTIA Cybersecurity Analyst+: Threat Intelligence

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are reviewing centralized firewall logs to determine if suspicious activity has taken place. What are you looking for?

Indicator of compromise

Which threat actor results from the promotion of an ideology?

Hacktivist

What is the purpose of a bug bounty?

ID and harden software flaws

Which activities are related to threat modeling? Choose two.

Impact and Likelihood

What is the first phase of the cyber kill chain?

Reconnaissance

Which standard is used to exchange cybersecurity data?

TAXII

Which items are prevalent searchable options on the attack.mitre.org web site?

Tactics, techniques, mitigations

What is the primary purpose of the Tor web browser?

Dark Net connectivity

What does CVE stand for?

Common vulnerabilities and exposures

Which cloud service proves useful when analyzing large amounts of data?

Machine Learning

Which terms best relates to the lack of security alerts since no problematic condition exists?

True negative

Which of the following are the most uniquely and closely related to the Dark Net? Choose two.

Unindexed web pages and Weapons


Ensembles d'études connexes

Simple and Stratified Epithelium

View Set

Prep U: Chapter 30: Management of Patients with Hematologic Neoplasms

View Set

HROD Chapter 8 MC - Power and Politics

View Set

Autonomic Nervous system Anatomy Lecture

View Set