In which of the following storage architecture is the data stored in a localized system, server, or
storage hardware and capable of storing a limited amount of data in its database and locally available
for data usage?
In which of the following forms of bulk data collection are large amounts of data first collected from
multiple sources in multiple formats and then processed to achieve threat intelligence?
Alison, an analyst in an XYZ organization, wants to retrieve information about a companys website
from the time of its inception as well as the removed information from the target website.
What should Alison do to get the information he needs.
An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and mitigate
the effect of such threats, Mr. Andrews was asked to perform threat modeling. During the process of
threat modeling, he collected important information about the treat actor and characterized the
analytic behavior of the adversary that includes technological details, goals, and motives that can be
useful in building a strong countermeasure.
What stage of the threat modeling is Mr. Andrews currently in?
Alice, an analyst, shared information with security operation managers and network operations
center (NOC) staff for protecting the organizational resources against various threats. Information
shared by Alice was highly technical and include threat actor TTPs, malware campaigns, tools used by
threat actors, and so on.
Which of the following types of threat intelligence was shared by Alice?
Sam works as an analyst in an organization named InfoTech Security. He was asked to collect
information from various threat intelligence sources. In meeting the deadline, he forgot to verify the
threat intelligence sources and used data from an open-source data provider, who offered it at a very
low cost. Through it was beneficial at the initial stage but relying on such data providers can produce
unreliable data and noise putting the organization network into risk.
What mistake Sam did that led to this situation?
A network administrator working in an ABC organization collected log files generated by a traffic
monitoring system, which may not seem to have useful information, but after performing proper
analysis by him, the same information can be used to detect an attack in the network.
Which of the following categories of threat information has he collected?
An organization suffered many major attacks and lost critical information, such as employee records,
and financial information. Therefore, the management decides to hire a threat analyst to extract the
strategic threat intelligence that provides high-level information regarding current cyber-security
posture, threats, details on the financial impact of various cyber-activities, and so on.
Which of the following sources will help the analyst to collect the required intelligence?
Tracy works as a CISO in a large multinational company. She consumes threat intelligence to
understand the changing trends of cyber security. She requires intelligence to understand the current
business trends and make appropriate decisions regarding new technologies, security budget,
improvement of processes, and staff. The intelligence helps her in minimizing business risks and
protecting the new technology and business initiatives.
Identify the type of threat intelligence consumer is Tracy.
An analyst wants to disseminate the information effectively so that the consumers can acquire and
benefit out of the intelligence.
Which of the following criteria must an analyst consider in order to make the intelligence concise, to
the point, accurate, and easily understandable and must consist of a right balance between tables,
graphics, and multimedia?
Joe works as a threat intelligence analyst with Xsecurity Inc. He is assessing the TI program by
comparing the project results with the original objectives by reviewing project charter. He is also
reviewing the list of expected deliverables to ensure that each of those is delivered to an acceptable
level of quality.
Identify the activity that Joe is performing to assess a TI programs success or failure.
Tyrion, a professional hacker, is targeting an organization to steal confidential information. He wants
to perform website footprinting to obtain the following information, which is hidden in the web page
Connection status and content type
Accept-ranges and last-modified information
Web server in use and its version
Which of the following tools should the Tyrion use to view header content?
Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached to a
stage where he is required to apply his analysis skills effectively to reject as many hypotheses and
select the best hypotheses from the identified bunch of hypotheses, and this is done with the help of
listed evidence. Then, he prepares a matrix where all the screened hypotheses are placed on the top,
and the listed evidence for the hypotheses are placed at the bottom.
What stage of ACH is Bob currently in?
SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the
process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as
intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can put in
more funds toward the resources which are critical for the organizations security.
Which of the following key features should SecurityTech Inc. consider in their TI plan for selecting the
During the process of threat intelligence analysis, John, a threat analyst, successfully extracted an
indication of adversarys information, such as Modus operandi, tools, communication channels, and
forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.