Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?
Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources like honeynets, P2P monitoring. infrastructure, and application logs.Which of the following categories of threat intelligence feed was acquired by Jian?
Which of the following components refers to a node in the network that routes the traffic from a workstation to external command and control server and helps in identification of installed malware in the network?
What is the correct sequence of steps involved in scheduling a threat intelligence program?1. Review the project charter2. Identify all deliverables3. Identify the sequence of activities4. Identify task dependencies5. Develop the final schedule6. Estimate duration of each activity7. Identify and estimate resources for all activities8. Define all activities9. Build a work breakdown structure (WBS)
Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.Which of the following sharing platforms should be used by Kim?
Daniel is a professional hacker whose aim is to attack a system to steal data and money for profit. He performs hacking to obtain confidential data such as social security numbers, personally identifiable information (PII) of an employee, and credit card information. After obtaining confidential data, he further sells the information on the black market to make money.Daniel comes under which of the following types of threat actor.