CTIA Module 04
You will received results through email.
Sign in to Google to save your progress. Learn more
What means System Baselining in a data collection environment?
1 point
Clear selection
Whe footprinting, metadata extraction tools gets the info from:
1 point
Clear selection
Select what kind of threat intelligence source is: IOC buckets
1 point
Clear selection
Select what kind of threat intelligence source is: Krebsonsecurity.com
1 point
Clear selection
Steps that an analyst can follow in order to use the loC data more effectively for building threat intelligence (select 3)
1 point
To hide phishing and malware delivery locations can be used...
1 point
Clear selection
Which is not a good practice in reparing a testbed for malware analysis?
1 point
Clear selection
Advanced Google search operators can be used for creating complex search queries. What does the next operator?     cache:
1 point
Clear selection
Select which site looks suitable for finding details about firewall, internal server type, OS used, software versions, database schema, network appliances.
1 point
Clear selection
Indicators of Compromise (loCs) can also be collected from various sources that exist within the organizational perimeter. Select a non internal source of IOCs
1 point
Clear selection
Select a non Free IOC Source...
1 point
Clear selection
____________ is generally referred to a person or an agent under the Regulation of Investigatory Powers Act 2000 (RIPA), UK.
1 point
Clear selection
Select the sites where is not possible to find yara rules.
1 point
Clear selection
A data sampling strategy will avoid generalization, where estimates can't be made about the total data based on the findings from the samples that are studied.
1 point
Clear selection
Which dll stands for Supports higher-level networking functions?
1 point
Clear selection
Select the type of data for end-level form of data that is filtered, analyzed, and relevant in form and it is distributed as report.
1 point
Clear selection
Which type of threat intelligence source comes from: Facebook, LinkedIn, Twitter, WhatsApp, Instagram, Telegram
1 point
Clear selection
______ allows redirecting potentially malicious IP address traffic into a ______ DNS server to prevent the malware from making DNS requests and resolving the hostnames from the malicious URLs.
1 point
Clear selection
Which dll stands for Functions for displaying and manipulating graphics?
1 point
Clear selection
Which type of threat intelligence feed is: Firewall Sandbox
1 point
Clear selection
Social enineering techniques. ____________ is a technique, where an analyst secretly observes the target to gain critical information. In the ______________ technique, the analyst stands behind the victim and secretly observes the victim's activities on the computer.
1 point
Clear selection
Analyst can use to perform website footprinting with this tools: (select 5)
1 point
Which type of Storage Platform is a Cloud Storage?
1 point
Clear selection
Advanced Google search operators can be used for creating complex search queries. What does the next operator?     allinanchor:
1 point
Clear selection
What means dark web versus deep web?
1 point
Clear selection
______ consists of information related to: the threat machine's IP address, operating systems, details about subnet, domain names of C2 headers, headers of the phishing emails, any network indicator or email indicator.
1 point
Clear selection
Which dll stands for Interface to the Windows kernel?
1 point
Clear selection
______involves high-level geopolitical assessment and collection of information related to political affairs, economics, societal interactions, technology developments.
1 point
Clear selection
______  consists of collection of: threat actor group reports, attack campaign reports, collection of incident reports and data from evaluated malware samples.
1 point
Clear selection
Select a  Free IOC Source...
1 point
Clear selection
Whois is a query and response protocol used for querying databases that listens to requests on port ______ (TCP).
1 point
Clear selection
Which type of threat intelligence feed is: Underground forums
1 point
Clear selection
Which type of threat intelligence source comes from: Electro-optical, Radar sensors, Acoustic sensors like sonars, LASER, Infrared, Spectroscopic sensors
1 point
Clear selection
______ data is also collected from sources like: high-level geopolitical assessment, OSINT, security industry white papers, human contacts.
1 point
Clear selection
Sampling is the technique of collecting small portions of data from huge chunks of data in such a way that the selected samples are considered as generalized samples of the entire chunk of data.
1 point
Clear selection
Which type of threat intelligence source comes from: Media, Internet, Public government data, Corporate/academic publishings, Literature
1 point
Clear selection
Which type of threat intelligence feed is: Brand monitoring
1 point
Clear selection
Which type of threat intelligence source comes from: Satellite imagery, Unmanned Aerial Vehicles (UAV) imagery, MapsGPS Waypoints, IMINT (Imagery Intelligence), National Geospatial-intelligenceAgency (NGA)
1 point
Clear selection
Which type of threat intelligence feed is: DNS monitoring
1 point
Clear selection
Select Benefits of Data Collection in a bulk way
1 point
Clear selection
_______________ ensueres how to securely collect the data and simultaneously maintain anonymity during the collection process depending on the organizational security policy to ensure privacy.
1 point
Clear selection
Social enineering techniques. ____________ is a common human-based social engineering technique where an analyst pretends to be a legitimate or authorized person
1 point
Clear selection
To obtain suitable data about Reverse IP Domain Check can be used...
1 point
Clear selection
______ is valid only for short time horizon.
1 point
Clear selection
Identify a Static Malware Analysis technique
1 point
Clear selection
Select the type of data for unprocessed, unaltered, and unfittered form of data.
1 point
Clear selection
Which type of threat intelligence feed is: Malware forensics
1 point
Clear selection
Which dll stands for Networking DLLs that help to connect to a network or perform network relatedtasks?
1 point
Clear selection
______ is a multi-platform tool that is used by malware researchers to identify and classify malware samples based on binary or textual patterns.
1 point
Clear selection
DeeperWeb is a dark net web browser.
1 point
Clear selection
Select the type of data for data that is filtered and sorted by other analysts.
1 point
Clear selection
What is Talend?
1 point
Clear selection
Analysts need to consider the ____________ of a threat to prioritize threat intelligence needs and requirements.
1 point
Clear selection
What that stands for IT-ISAC?
1 point
Clear selection
Select which site looks suitable for finding details about Fully Qualified Domain Names (FQDNs), log samples, IP addresses, and usernames in messages at ...
1 point
Clear selection
______ categorizes attacks such as email, web, and USB accordingto the attack vector used to trick humans. The toolkit attacks human weakness, exploitingtrust, fear, avarice, and the helping nature of humans.
1 point
Clear selection
Use the ___________ tool to determine visually the relationships and real world links among people, groups of people (social networks), companies, organizations, websites, Internet infrastructure, phrases, documents, and files.
1 point
Clear selection
What kind of DNS recod contains host's name server?
1 point
Clear selection
Indicators of Compromise (loCs) can also be collected from various sources that exist within the organizational perimeter. Select a non internal source of IOCs
1 point
Clear selection
Which is not a search engine very suitable for the deep web?
1 point
Clear selection
What kind of DNS recod contains an alias name?
1 point
Clear selection
Which type of Storage Platform is a Distributed Storage?
1 point
Clear selection
Select what kind of threat intelligence source is: CERIAS Blog
1 point
Clear selection
Building Custom IoCs with... (select 2)
1 point
Which type of threat intelligence source comes from: Honeypots, Passive DNS monitors, Online web trackers, Sock puppets (fake profiling) on online forums, Publishing false reports  
1 point
Clear selection
Which type of threat intelligence source comes from: Visual photography, Infrared sensors, Synthetic Aperture Radar (SAR), MASINT (Measurement and Signature Intelligence), LASER, Electro-optics
1 point
Clear selection
______ can be acquired from social media sources and chat room conversations for any indications of pre-planned attacks.
1 point
Clear selection
Social enineering techniques. The social engineer will cause some incident creating a problem and then present himself/herself as the problem solver through general conversation with ____________  
1 point
Clear selection
Which type of threat intelligence feed is: Mailbox misuse information
1 point
Clear selection
Social enineering techniques. ____________  is the process of retrieving sensitive personal or organizational information by searching through trash bins.
1 point
Clear selection
Analyst can gather a ____________ from job postings, which the attackers can gather through footprinting job sites.
1 point
Clear selection
Which type of threat intelligence source comes from: Foreign equipment, Foreign weapon systems, SatellitesTechnical research papers, Foreign media, Human contacts
1 point
Clear selection
______  is a cyber counterintelligence mechanism where a recursive DNS server is employed to perform inter-server DNS communication.
1 point
Clear selection
To obtain suitable data about Domain created date can be used...
1 point
Clear selection
______provides crucial information related to the attacker, attack patterns, and also can achieve information of when likely would the attack take place.
1 point
Clear selection
______ involves the collection of actionable information about any specific incoming attacks or events. It provides crucial information about activity-related attacks
1 point
Clear selection
Advanced Google search operators can be used for creating complex search queries. What does the next operator?     related:
1 point
Clear selection
______ is an information system resource that is expressly set up to attract and trap people who attempt to penetrate an organization's network.
1 point
Clear selection
_________ is a open source framework that allows everyone to automatically collect and visualize any sort of threat intelligence data harvested (loCs)
1 point
Clear selection
Files that can be ussually tested into a sandbox.
1 point
Clear selection
Operational Security (OPSEC) refers to...
1 point
Clear selection
Select what kind of threat intelligence source is: MISP (Malware Information Sharing Platform)
1 point
Clear selection
Use _______ to find metadata and hidden information in the documents it scans from websites.
1 point
Clear selection
Threat information is only as trustworthy as the source of that data, so it is essential to validate the ______ of third-party threat intelligence sources.
1 point
Clear selection
Which kind of Data Collection Methods are done with internal forums, internal network activities or traffic system logs of an organization?
1 point
Clear selection
An organizations asset which ip address dynamically changes can use...
1 point
Clear selection
Select which is not an IoC Data Collection Tool through Internal Sources
1 point
Clear selection
Which type of threat intelligence feed is: Law enforcement feed
1 point
Clear selection
Analysts can also collect information about VOIP and VPN network using Google advanced operators.
1 point
Clear selection
Select a comercial IOC's external source.
1 point
Clear selection
To obtain suitable data about adversary IP can be used... (3 choice)
1 point
Which type of threat intelligence feed is: GEOIP statistics
1 point
Clear selection
Select Data collection through search engines (select 3)
1 point
Which is the Regional Internet Registry for Europe?
1 point
Clear selection
Advanced Google search operators can be used for creating complex search queries. What does the next operator?     link:
1 point
Clear selection
______ deals with the technicalities of an attacker's assets and infrastructure.
1 point
Clear selection
Normalization is the process of ________ _____ to make it sorted and usable by the humans as well as by automated machine tools for intelligence consumption.
1 point
Clear selection
Select which site looks suitable for finding details about employees' interests and then trick them to reveal more information.
1 point
Clear selection
Select what kind of threat intelligence source is: MineMeld
1 point
Clear selection
Analysts can perform __________ to identify behavioural vulnerabilities in human resources of an organization like human nature of trust.
1 point
Clear selection
Select a malware analysis tool
1 point
Clear selection
Which type of threat intelligence feed is: Vulnerability information
1 point
Clear selection
Select a parameter of nromalization:
1 point
Clear selection
Malware analysis is a process of ______________ a specific piece of malware in order to determine the origin, functionality, and potential impact of a given type of malware.
1 point
Clear selection
Which type of threat intelligence source comes from: Financial Intelligence Unit (FIU), Banks, SWIFT, Informal value transfer systems (IVTS)    
1 point
Clear selection
What data can be collected from: www.httrack.com
1 point
Clear selection
For ease of analysis and dissemination, collected threat data must be present in the structured form. Select which is not a strcuture for this purpose.
1 point
Clear selection
Which type of Storage Platform is a centralized platform?
1 point
Clear selection
Received: from DB8EUR06HT009.eop-eur06.prod.protection.outlook.com (2603:10a6:20b:3a::24) by AM7PR09MB3621.eurprd09.prod.outlook.com with HTTPS via AM6PR0202CA0047.EURPRD02.PROD.OUTLOOK.COM; Wed, 18 Nov 2020 11:55:03 +0000Received: from DB8EUR06FT034.eop-eur06.prod.protection.outlook.com (2a01:111:e400:fc35::45) by DB8EUR06HT009.eop-eur06.prod.protection.outlook.com (2a01:111:e400:fc35::198) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3564.22; Wed, 18 Nov 2020 11:55:03 +0000Authentication-Results: spf=none (sender IP is 5.34.181.2) smtp.mailfrom=mn.com; hotmail.com; dkim=none (message not signed) header.d=none;hotmail.com; dmarc=none action=none header.from=agenciatributaria.com;Received-SPF: None (protection.outlook.com: mn.com does not designate permitted sender hosts)Received: from mn.com (5.34.181.2) by DB8EUR06FT034.mail.protection.outlook.com (10.233.253.13) with Microsoft SMTP Server id 15.20.3589.20 via Frontend Transport; Wed, 18 Nov 2020 11:55:03 +0000X-IncomingTopHeaderMarker: OriginalChecksum:F7ABAC3A49EC960586AD20AAEBF2858A06A6F678A1959CC4A75190EA4C707701;UpperCasedChecksum:5C2B0F355AA6CC255ECA968D24B6777D24D5B173ABF7EC530D1F3E88BD187438;SizeAsReceived:358;Count:7Received: by mn.com (Postfix, from userid 0) id 4E5EF7C9F7; Wed, 18 Nov 2020 10:15:45 +0100 (CET)content-type: text/htmlSubject: Notificacion Pendiente - Servicio Tributaria - N(777383937)From: aviso@agenciatributaria.comTo: manoloperez@hotmail.comMessage-Id: <20201118091830.4E5EF7C9F7@mn.com>Date: Wed, 18 Nov 2020 10:15:45 +0100 (CET)X-IncomingHeaderCount: 7....................................................................................................................................................................................................................................................................WHICH IS THE ORIGINAL MAIL SENDER?
1 point
Clear selection
______ deals with TTP's of threat groups and is most effectively used in defending an organization.
1 point
Clear selection
______ is used to perform analysis that is consumed by high-level senior leaders within an organization to understand and predict risks and threats for an organization.
1 point
Clear selection
One way to obtain in block hostnames, machine names, user names, IP addresses, aliases assigned within a domain is by....
1 point
Clear selection
Types of Data Sampling (3 selection)
1 point
Select security measures that can be adopted in a data collection process. (select 4)
1 point
What data can be collected from: archive.org
1 point
Clear selection
Social enineering techniques. ____________ is the act of secretly listening to the conversations of people over a phone or video conference without their consent.
1 point
Clear selection
When footprinting, hidden to the search engines info can be obtained from:
1 point
Clear selection
What data can be collected from: apility.io
1 point
Clear selection
Select what kind of threat intelligence source is: FortiGuard
1 point
Clear selection
Which type of threat intelligence source comes from: interception of communication signals, electronic sensors like radars, non-human communication systems
1 point
Clear selection
Data Collection through Web Services: Finding Top-Level Domains (TLDs) and Sub-domains ca be done using....
1 point
Which type of threat intelligence feed is: Fraud analysis
1 point
Clear selection
What means Stage Host Integrity Monitoring in a data collection environment?
1 point
Clear selection
Advanced Google search operators can be used for creating complex search queries. What does the next operator?     Filetype:
1 point
Clear selection
Which kind of Data Collection Methods are done with shared networks, commercial external feeds and sources, information systems, specific network built to lure and trap the adversaries?
1 point
Clear selection
Select what kind of threat intelligence source is: European Union Agency for Network and Information Security (ENISA)
1 point
Clear selection
Analysts can perform __________ to identify behavioural vulnerabilities in human resources of an organization like human nature of trust.
1 point
Clear selection
What data can be collected from: www.alexa.com
1 point
Clear selection
Analyst must ensure the __________ of data that is collected in order to achieve better threat intelligence.
1 point
Clear selection
Imagery or social media are reliable sources of data for threat intelligence.
1 point
Clear selection
Website footprinting may provide the following information: (select 5)
1 point
Select a well ordered collection plan
1 point
Clear selection
Social enineering techniques. ____________  usually implies entry into a building or a security area with the consent of the authorized person. For example, the analyst would request an authorized person to unlock a security door, saying that they have forgotten their ID badge.
1 point
Clear selection
What web browser is best suited for browsing dark net?
1 point
Clear selection
Which file will match the next yara rule?
1 point
Captionless Image
Clear selection
Social enineering techniques. ____________ implies access to a building or a secured area without the consent of the authorized person. It is the act of following an authorized person through a secure entrance.
1 point
Clear selection
Analysts need to concentrate on selecting intelligence sources that contain data that is (select 4)
1 point
Which kind of Data Collection Methods are done with external networks or information systems that are under the control of an adversary?
1 point
Clear selection
Submit
Clear form
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy

Does this form look suspicious? Report