CS0-002 - CompTIA Cybersecurity Analyst+: Threat Intelligence
You are reviewing centralized firewall logs to determine if suspicious activity has taken place. What are you looking for?
Indicator of compromise
Which threat actor results from the promotion of an ideology?
Hacktivist
What is the purpose of a bug bounty?
ID and harden software flaws
Which activities are related to threat modeling? Choose two.
Impact and Likelihood
What is the first phase of the cyber kill chain?
Reconnaissance
Which standard is used to exchange cybersecurity data?
TAXII
Which items are prevalent searchable options on the attack.mitre.org web site?
Tactics, techniques, mitigations
What is the primary purpose of the Tor web browser?
Dark Net connectivity
What does CVE stand for?
Common vulnerabilities and exposures
Which cloud service proves useful when analyzing large amounts of data?
Machine Learning
Which terms best relates to the lack of security alerts since no problematic condition exists?
True negative
Which of the following are the most uniquely and closely related to the Dark Net? Choose two.
Unindexed web pages and Weapons