100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CTIA EXAM WITH CORRECT ANSWERS 2024 $20.49   Add to cart

Exam (elaborations)

CTIA EXAM WITH CORRECT ANSWERS 2024

 5 views  0 purchase
  • Course
  • CTIA
  • Institution
  • CTIA

Q. 1 Which of the following terms refers to the existence of a weakness, design flaw, or implementation error, which can lead to an unexpected event compromising the security of the system? A. Hacking B. Zero-day attack C. Exploit D. Vulnerability correct answers D 2 Which of the followi...

[Show more]

Preview 4 out of 85  pages

  • August 19, 2024
  • 85
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CTIA
  • CTIA
avatar-seller
HopeJewels
CTIA
Q. 1 Which of the following terms refers to the existence of a weakness, design flaw, or
implementation error, which can lead to an unexpected event compromising the security
of the system?
A. Hacking
B. Zero-day attack
C. Exploit
D. Vulnerability correct answers D

2 Which of the following types of threat actors are unskilled hackers who compromise
systems by running scripts, tools, and software developed by real hackers?
A. Industrial spies
B. State-sponsored hackers
C. Organized hackers
D. Script kiddies correct answers D

3 Which of the following components refers to a node in the network that routes the
traffic from a workstation to external command and control server and helps in
identification of installed malware in the network?
A. Repeater
B. Hub
C. Gateway
D. Network interface card (NIC) correct answers C

4 What is the main source of technical threat intelligence data collection?
A. Malware indicators, network indicators, and e-mail indicators
B. Chat room conversations
C. Geopolitical information
D. Data feeds and online sources correct answers A

5 Which of the following types of data analysis deals with analyzing the real-time data of
the current activities and enables the analyst to identify what is currently happening in
the organization based on the acquired real-time data?
A. Predictive
B. Diagnostic
C. Descriptive
D. Prescriptive correct answers C

6 Which of the following criteria is used to rate intelligence that is delivered to the
stakeholder that helps in improving the defense strategies to detect the reported threats
and decrease reoccurrences?
A. Informative
B. Awareness

,C. Richness
D. Actionable correct answers D

7 Which of the following terms describes an interpreted information providing broader
in-depth knowledge of the subject that supports decision making and response actions
to resolve complex problems?
A. Data
B. Knowledge
C. Information
D. Intelligence correct answers D

8 Clark is an attacker who wants to acquire confidential information of a target
organization for some financial benefit. He created an illegitimate e-mail containing
malicious links and distributed to all the employees of that organization to obtain private
information, such as social security numbers, account numbers, credit card numbers,
and mobile numbers. Which type of attack does this scenario present?
A. Phishing
B. Buffer overflow
C. Spoofing
D. Denial-of-service attack correct answers A

9 Marry wants to follow an iterative and incremental approach to prioritize requirements
in order to protect the important assets of an organization against attacks. She wants to
set the requirements based on the order of priority, where the most important
requirement must meet before, for a greater chance of success. She wants to apply
prioritization tasks, scenarios, use cases, tests, and so on.
Which of the following methodologies should Marry use to prioritize the requirements?
A. Data visualization
B. MoSCoW
C. Fusion analysis
D. Data sampling correct answers B

10 Which of the following terms refers to the risk management process where an
analyst analyzes the complete operations from an adversary point of view to provide
security measures and avoid sensitive organizational data to get exposed?
A. OPSEC
B. CCI
C. ISAC
D. ENISA correct answers A

11 Which of the following data analysis techniques refers to the standard data analysis
process employed by the analysts to efficiently narrow down the required information
from the collected data and can be used on any type of data?
A. Structured analysis of competing hypotheses (SACH)
B. Opportunity analysis
C. Statistical data analysis

,D. Analysis of competing hypotheses (ACH) correct answers C

12 Which of the following threat information types is referred to as a pattern that can be
matched with the low-level data to detect malicious activities in the network?
A. Detection indicators
B. Low-level data
C. Advisories
D. Strategic reports correct answers A

13 Which of the following types of threat intelligence provides high-level information
regarding cyber-security posture, threats, details about the financial impact of various
cyber activities, attack trends, and the impact of high-level business decisions?
A. Operational threat intelligence
B. Technical threat intelligence
C. Strategic threat intelligence
D. Tactical threat intelligence correct answers C

14 Which of the following characteristics of APT refers to numerous attempts done by
the attacker to gain entry to the target's network?
A. Multiphased
B. Attack origination points
C. Timeliness
D. Risk tolerance correct answers B

15 Which of the following points should be considered while preparing a nondisclosure
agreement?
A. It should include agreed-upon rules on what type of intelligence is needed by
different consumers.
B. Intelligence team can overcome legal, federal, and policy-related restrictions to use
different tactics, systems, and personnel in the threat intelligence program.
C. It should clearly identify all parties to the agreement; it should specifically include the
starting date and length of the nondisclosure period.
D. It should dictate the rules to be followed while implementing the threat intelligence
program. correct answers C

16 Which of the following types of intelligence is collected from sources like Honeypots,
Passive DNS monitors, online web trackers, or Sock puppets?
A. Cyber counterintelligence (CCI)
B. Financial intelligence
C. Measurement and signature intelligence (MASINT)
D. Technical intelligence correct answers A

17 Steve is working as an analyst for Highlanders & Co. While performing data analysis,
he used a method in which he included a list of all activities required to complete the
project, time, dependencies, and logical endpoints such as milestones to acquire

, information about the relationship between various activities and the period of the
activities obtained. Which of the following data analysis methods was used by Steve?
A. Critical path analysis
B. Timeline analysis
C. Analogy analysis
D. Cone of plausibility correct answers A

18 Which of the following terms refers to determining security designation and handling
requirements by reviewing indicator metadata?
A. Prioritization
B. Decompression
C. Categorization
D. Content extraction correct answers C

19 Which of the following components of threat intelligence enabled risk management
process generates detailed information about various sources and techniques used to
gather threat information that is fed as input to risk assessment?
A. Assess
B. Respond
C. Frame
D. Monitor correct answers C

20 Clark, a professional hacker, is trying to perform an APT attack on a target
organization's network. He is trying to obtain the administrative login credentials of the
compromised system to gain further access to the systems in the network. What phase
of the APT lifecycle is Clark currently in?
A. Cleanup
B. Preparation
C. Expansion
D. Persistence correct answers C

21 Which of the following terms related to threat intelligence program provides a way to
communicate about what activities need to be completed and what resources will be
allocated to accomplish the activities and in what timeframe will those be completed?
A. Budget planning
B. Scheduling
C. Requirement analysis
D. Collection planning correct answers B

22 Which of the following is a vertical community source where the information is
collected from various threat intelligence sharing communities?
A. Kaspersky
B. MineMeld
C. SecureWorks
D. FortiGuard correct answers B

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller HopeJewels. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $20.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$20.49
  • (0)
  Add to cart