Cyber treat Week6

docx

School

Grand Rapids Community College *

*We aren’t endorsed by this school

Course

CYBER SECU

Subject

Sociology

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by ConstableWildcatMaster401

Report
Congratulations! You passed! Grade received 95.83% Latest Submission Grade 95.83% To pass 80% or higher Go to next item 1. Question 1 What is one thing that makes cybersecurity threats so challenging to deal with? 1 / 1 point Most organizations are faced with too few attacks to study effectively or dedicate full-time specialists to investigate There is a big shortage in cyber security skills and many job openings unfilled The large majority of "breaches" are inadvertent mistakes by employees which distracts from investigating the few that are from real cyber criminals 'There are too few cybersecurity tools available from too few vendors Correct Correct! 2. Question 2 The level 3 and 4 cybersecurity analysts working in a Security Operations Center (SOC) combat cyber crime by performing which type of activity? 1 / 1 point Penetration testing Cyber threat hunting Cyber forensic investigations Cyber data mining Correct Correct! 3. Question 3 True or False. If you have no better place to start hunting threats, start with a view of your own organization then work your way up to an industry view and then a regional view, a national view and finally a global view of the threat landscape. 1 / 1 point True False Correct Correct! 4. Question 4 Your enemy uses a cyber kill chain to plan and execute his attack against your organization. Which three (3) of these are steps in a cyber kill chain? 0.75 / 1 point Exploitation Correct Partially correct! Recovery This should not be selected Incorrect. Perhaps you should review the video SOC Cyber Threat Hunting. Installation Correct
Partially correct! Delivery Correct Partially correct! 5. Question 5 True or False. A cyber threat hunting team generally sits outside the SOC command center. 1 / 1 point True False Correct Correct! 6. Question 6 There is value brought by each of the IBM i2 EIA use cases. Which one of these identifies net new money chain transfers? 1 / 1 point Insider Threat VIP Protection Fraud Investigations Cyber Threat Hunting Correct Correct!
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help