Skip to content Skip to sidebar Skip to footer

arcX Cyber Threat Intelligence 101 Answer

arcX Cyber Threat Intelligence 101 course

Interested in this course?

  •  Course Summary 100% online and on-demand self-study course 
  • 4+ hours of training content 
  • Includes 2.5+ hours of video training 
  • Engaging exercises 
  • 100+ practice questions 
  • arcX final micro exam


What is considered to be the foundation we use to build cyber threat intelligence?

 Intelligence Cycle

 Threat Feeds

 Analysis of Competing Hypothesis



A colleague has told you about an offer of money they have received to disclose sensitive organisational data. You do not know if they have carried out the action. You should report this information to your management. What type of consideration is this?


 Legal and Ethical




Why might it be good for a CTI analyst to feed off incident response?

 The CTI analyst can help with any post-incident recovery

 The CTI analyst can report into the board on how the clean up is going

 The CTI analyst can gain an understanding of how incident response do their job

 The CTI analyst could learn something about the threat actor that could help identify motivation, capability and intent


A company hashes their data files in order to monitor whether information has been tampered with. Within the context of the CIA Triad, this example refers to?





What is the purpose of the intelligence cycle?

 The process of developing raw information into finished intelligence for an end consumer

 The process of helping an organisation to ask good questions about their current security situation

 The process of converting questions into answers

 The process of taking intelligence and breaking it down into manageable and consumable nuggets


Which of these is a well-known threat actor?

 Lazarus Group

 Lazer Quest

 Pirates of the Caribbean



In terms of Nation State hacking groups, which country would we typically attribute 'Fancy Bear' to?

 North Korea

 United Kingdom




When considering the hacker hat categories (Black, White, Grey) what would be considered as the major differentiating factor?






The process of taking vast amounts of data and collating it into digestible information occurs at which stage of the intelligence cycle?






Intelligence does not create itself… we need which of the following to help steer us?


 A Cyber Attack




When do organisations typically invest the most money in cyber security?      

 Upon CTI recommendations

 After a breach

 Beginning of the financial year

 Before a breach


What does APT stand for within the context of Cyber Threat Intelligence?

 Attack Protocol Training

 Advanced Profiled Threat

 Avanced Persistent Threat

 Attacking Persistent Threat


Threat hunting within log files would be an appropriate discussion point at which communication level?






In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?

 Insider Attack

 Ransomware Attack

 Cyber Attack

 Zero-day Attack


A school uses clustered servers to ensure that its students are always able to submit their coursework, even if a server is down for maintenance. Server clustering enables which aspect of the CIA Triad?





Which of these acts is relevant to you as a CTI analyst?

 National Secrets Act 1938

 Intelligence Act 1998

 Cyber Security Act 2003

 Official Secrets Act 1989


What does CTI stand for?

 Cyber Threat Investigation

 Combined Threat Intelligence

 Cyber Threat Intelligence

 Cyber Threat Information


CTI within the context of an organisation, is able to interact with the Security Operations Centre in the following way(s)?

 Take information out and pass it on

 Feed information in and take information out

 Feed information in

 Take information out


Which of the following would be considered a legal issue?

 Reporting a breach

 Finding and keeping a wallet found on the floor

 Not following company password policy

 Not telling your organisation about a potential system vulnerability


Which are the 3 primary ways of measuring threat actors?

 Capability, Access and Intent      

 Motivation, Experience and Access

 Motivation, Access and Intent

 Motivation, Capability and Intent

When an organisation suffers a data breach what would we hope to see happen as potential customers?

 Responsible disclosures

 Finding out who was responsible

 Reputational repair        

 Revenue saving operations


What is the process of forming a secure barrier between the steps of the intelligence cycle called?

 Brick Wall

 Stable Barrier

 Sterile Corridor

 Security Perimeter


Threat Intelligence is great at showing organisations the risks they face from external threats but which of the following risks would Threat Intelligence not be helpful for?

 Indicators of Compromise

 Advanced Persistent Threats

 Loss of Competitive Advantage

 Zero-day Threats


What does TTP stand for?

 Tactics, Techniques and Procedures

 Training, Techniques and Procedures

 Threats, Training and Policy

 Tactics, Threats and Preconceptions

Only authorised personnel at a company have write access to certain files. Within the context of the CIA Triad, this example refers to what?




Author “Yes I'm seeking for someone, to help me. So that some day I will be the someone to help some other one.”

Post a Comment for "arcX Cyber Threat Intelligence 101 Answer"