Question 11

Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence analysts. During the process, the analysts started converting the raw data into useful information by applying various techniques, such as machine-based techniques, and statistical methods.
In which of the following phases of the threat intelligence lifecycle is the threat intelligence team currently working?
  • Question 12

    Tracy works as a CISO in a large multinational company. She consumes threat intelligence to understand the changing trends of cyber security. She requires intelligence to understand the current business trends and make appropriate decisions regarding new technologies, security budget, improvement of processes, and staff. The intelligence helps her in minimizing business risks and protecting the new technology and business initiatives.
    Identify the type of threat intelligence consumer is Tracy.
  • Question 13

    In which of the following storage architecture is the data stored in a localized system, server, or storage hardware and capable of storing a limited amount of data in its database and locally available for data usage?
  • Question 14

    Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive dat a. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information and so on.
    What should Jim do to detect the data staging before the hackers exfiltrate from the network?
  • Question 15

    What is the correct sequence of steps involved in scheduling a threat intelligence program?
    1. Review the project charter
    2. Identify all deliverables
    3. Identify the sequence of activities
    4. Identify task dependencies
    5. Develop the final schedule
    6. Estimate duration of each activity
    7. Identify and estimate resources for all activities
    8. Define all activities
    9. Build a work breakdown structure (WBS)