0% found this document useful (0 votes)
264 views15 pages

Organized Hackers

1. Daniel is a professional hacker who hacks systems to steal confidential data like social security numbers and credit card information in order to sell it for profit. He would be considered an organized hacker. 2. An attacker is using fast-flux DNS to hide phishing and malware delivery locations by having a single domain name resolve to multiple IP addresses that change rapidly as compromised bots are used. 3. The amber TLP color should be used to share threat information within a particular community.

Uploaded by

CARLOS MAFLA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
264 views15 pages

Organized Hackers

1. Daniel is a professional hacker who hacks systems to steal confidential data like social security numbers and credit card information in order to sell it for profit. He would be considered an organized hacker. 2. An attacker is using fast-flux DNS to hide phishing and malware delivery locations by having a single domain name resolve to multiple IP addresses that change rapidly as compromised bots are used. 3. The amber TLP color should be used to share threat information within a particular community.

Uploaded by

CARLOS MAFLA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

1.

Daniel is a professional hacker whose aim is to attack a system to steal data and money for
profit. He performs hacking to obtain confidential data such as social security numbers,
personally identifiable information (PII) of an employee, and credit card information. After
obtaining confidential data, he further sells the information on the black market to make
money.
Daniel comes under which of the following types of threat actor.
Industrial spies
State-sponsored hackers
Insider threat
Organized hackers

2. An attacker instructs bots to use camouflage mechanism to hide his phishing and malware
delivery locations in the rapidly changing network of compromised bots. In this particular
technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?
DNS zone transfer
Dynamic DNS
DNS interrogation
Fast-Flux DNS

3. Kathy wants to ensure that she shares threat intelligence containing sensitive information with
the appropriate audience. Hence, she used traffic light protocol (TLP).
Which TLP color would you signify that information should be shared only within a particular
community?
Red
White
Green
Amber
4. Moses, a threat intelligence analyst at InfoTec Inc., wants to find crucial information about the
potential threats the organization is facing by using advanced Google search operators. He
wants to identify whether any fake websites are hosted at the similar to the organization’s URL.
Which of the following Google search queries should Moses use?
related: www.infothech.org
info: www.infothech.org
link: www.infothech.org
cache: www.infothech.org

5. A team of threat intelligence analysts is performing threat analysis on malware, and each of
them has come up with their own theory and evidence to support their theory on a given
malware.
Now, to identify the most consistent theory out of all the theories, which of the following
analytic processes must threat intelligence manager use?
Threat modelling
Application decomposition and analysis (ADA)
Analysis of competing hypotheses (ACH)
Automated technical analysis
6. Miley, an analyst, wants to reduce the amount of collected data and make the storing and
sharing process easy. She uses filtering, tagging, and queuing technique to sort out the relevant
and structured data from the large amounts of unstructured data Which of the following
techniques was employed by Miley?
Sandboxing
Normalization
Data visualization
Convenience sampling

7. Bob, a threat analyst, works in an organization named TechTop. He was asked to collect
intelligence to fulfil the needs and requirements of the Red Tam present within the organization.
Which of the following are the needs of a RedTeam?
Intelligence related to increased attacks targeting a particular software or operating system
vulnerability
Intelligence on latest vulnerabilities, threat actors, and their tactics, techniques, and
procedures (TTPs)
Intelligence extracted latest attacks analysis on similar organizations, which includes details
about latest threats and TTPs
Intelligence that reveals risks related to various strategic business decisions
8. Michael, a threat analyst, works in an organization named TechTop, was asked to conduct a
cyber-threat intelligence analysis. After obtaining information regarding threats, he has started
analyzing the information and understanding the nature of the threats.
What stage of the cyber-threat intelligence is Michael currently in?
Unknown unknowns
Unknowns unknown
Known unknowns
Known knowns
9. Enrage Tech Company hired Enrique, a security analyst, for performing threat intelligence
analysis. While performing data collection process, he used a counterintelligence mechanism
where a recursive DNS server is employed to perform interserver DNS communication and when
a request is generated from any name server to the recursive DNS server, the recursive DNS
servers log the responses that are received. Then it replicates the logged data and stores the
data in the central database. Using these logs, he analyzed the malicious attempts that took
place over DNS infrastructure.
Which of the following cyber counterintelligence (CCI) gathering technique has Enrique used for
data collection?
Data collection through passive DNS monitoring
Data collection through DNS interrogation
Data collection through DNS zone transfer
Data collection through dynamic DNS (DDNS)
10. John, a professional hacker, is trying to perform APT attack on the target organization network.
He gains access to a single system of a target organization and tries to obtain administrative
login credentials to gain further access to the systems in the network using various techniques.
What phase of the advanced persistent threat lifecycle is John currently in?
Initial intrusion
Search and exfiltration
Expansion
Persistence

11. Jim works as a security analyst in a large multinational company. Recently, a group of hackers
penetrated into their organizational network and used a data staging technique to collect
sensitive data. They collected all sorts of sensitive data about the employees and customers,
business tactics of the organization, financial information, network infrastructure information
and so on.
What should Jim do to detect the data staging before the hackers exfiltrate from the network?
Jim should identify the attack at an initial stage by checking the content of the user agent field.
Jim should analyze malicious DNS requests, DNS payload, unspecified domains, and destination
of DNS requests.
Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and
event logs.
Jim should identify the web shell running in the network by analyzing server access, error logs,
suspicious strings indicating encoding, user agent strings, and so on.

12. Andrews and Sons Corp. has decided to share threat information among sharing partners. Garry,
a threat analyst, working in Andrews and Sons Corp., has asked to follow a trust model
necessary to establish trust between sharing partners. In the trust model used by him, the first
organization makes use of a body of evidence in a second organization, and the level of trust
between two organizations depends on the degree and quality of evidence provided by the first
organization.
Which of the following types of trust model is used by Garry to establish the trust?
Mediated trust
Mandated trust
Direct historical trust
Validated trust

13. A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of
a connection request from a remote host to the server. From this data, he obtains only the IP
address of the source and destination but no contextual information. While processing this data,
he obtains contextual information stating that multiple connection requests from different geo-
locations are received by the server within a short time span, and as a result, the server is
stressed and gradually its performance has reduced. He further performed analysis on the
information based on the past and present experience and concludes the attack experienced by
the client organization.
Which of the following attacks is performed on the client organization?
DHCP attacks
MAC spoofing attack
Distributed Denial-of-Service (DDoS) attack
Bandwidth attack
14. Jame, a professional hacker, is trying to hack the confidential information of a target
organization. He identified the vulnerabilities in the target system and created a tailored
deliverable malicious payload using an exploit and a backdoor to send it to the victim.
Which of the following phases of cyber kill chain methodology is Jame executing?
Reconnaissance
Installation
Weaponization
Exploitation
15. Steve works as an analyst in a UK-based firm. He was asked to perform network monitoring to
find any evidence of compromise. During the network monitoring, he came to know that there
are multiple logins from different locations in a short time span. Moreover, he also observed
certain irregular log in patterns from locations where the organization does not have business
relations. This resembles that somebody is trying to steal confidential information.
Which of the following key indicators of compromise does this scenario present?
Unusual outbound network traffic
Unexpected patching of systems
Unusual activity through privileged user account
Geographical anomalies
16. Which of the following characteristics of APT refers to numerous attempts done by the attacker
to gain entry to the target’s network?
Risk tolerance
Timeliness
Attack origination points
Multiphased
17. Lizzy, an analyst, wants to recognize the level of risks to the organization so as to plan
countermeasures against cyber attacks. She used a threat modelling methodology where she
performed the following stages:
Stage 1: Build asset-based threat profiles
Stage 2: Identify infrastructure vulnerabilities
Stage 3: Develop security strategy and plans
Which of the following threat modelling methodologies was used by Lizzy in the aforementioned
scenario?
TRIKE
VAST
OCTAVE
DREAD
18. Which of the following types of threat attribution deals with the identification of the specific
person, society, or a country sponsoring a well-planned and executed intrusion or attack over its
target?
Nation-state attribution
True attribution
Campaign attribution
Intrusion-set attribution

19. In a team of threat analysts, two individuals were competing over projecting their own
hypotheses on a given malware. However, to find logical proofs to confirm their hypotheses, the
threat intelligence manager used a de-biasing strategy that involves learning strategic decision
making in the circumstances comprising multistep interactions with numerous representatives,
either having or without any perfect relevant information.
Which of the following de-biasing strategies the threat intelligence manager used to confirm
their hypotheses?
Game theory
Machine learning
Decision theory
Cognitive psychology

20. Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat
intelligence analysts. During the process, the analysts started converting the raw data into
useful information by applying various techniques, such as machine-based techniques, and
statistical methods.
In which of the following phases of the threat intelligence lifecycle is the threat intelligence
team currently working?
Dissemination and integration
Planning and direction
Processing and exploitation
Analysis and production
21. Jian is a member of the security team at Trinity, Inc. He was conducting a real-time assessment
of system activities in order to acquire threat intelligence feeds. He acquired feeds from sources
like honeynets, P2P monitoring. infrastructure, and application logs.
Which of the following categories of threat intelligence feed was acquired by Jian?
Internal intelligence feeds
External intelligence feeds
CSV data feeds
Proactive surveillance feeds
22. Which of the following components refers to a node in the network that routes the traffic from
a workstation to external command and control server and helps in identification of installed
malware in the network?
Repeater
Gateway
Hub
Network interface card (NIC)
23. What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter


2. Identify all deliverables
3. Identify the sequence of activities
4. Identify task dependencies
5. Develop the final schedule
6. Estimate duration of each activity
7. Identify and estimate resources for all activities
8. Define all activities
9. Build a work breakdown structure (WBS)

1-->9-->2-->8-->3-->7-->4-->6-->5
3-->4-->5-->2-->1-->9-->8-->7-->6
1-->2-->3-->4-->5-->6-->9-->8-->7
1-->2-->3-->4-->5-->6-->7-->8-->9

24. Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat
information from a variety of sources. He wants to use this information to develop security
policies to enhance the overall security posture of his organization.
Which of the following sharing platforms should be used by Kim?
Cuckoo sandbox
OmniPeek
PortDroid network analysis
Blueliv threat exchange network

25. During the process of threat intelligence analysis, John, a threat analyst, successfully extracted
an indication of adversary’s information, such as Modus operandi, tools, communication
channels, and forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.
Operational threat intelligence analysis
Technical threat intelligence analysis
Strategic threat intelligence analysis
Tactical threat intelligence analysis
26. Tim is working as an analyst in an ABC organization. His organization had been facing many
challenges in converting the raw threat intelligence data into meaningful contextual
information. After inspection, he found that it was due to noise obtained from
misrepresentation of data from huge data collections. Hence, it is important to clean the data
before performing data analysis using techniques such as data reduction. He needs to choose an
appropriate threat intelligence framework that automatically performs data collection, filtering,
and analysis for his organization.
Which of the following threat intelligence frameworks should he choose to perform such task?
HighCharts
SIGVERIF
Threat grid
TC complete
27. Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He
was assigned to work on establishing criteria for prioritization of intelligence needs and
requirements.
Which of the following considerations must be employed by Henry to prioritize intelligence
requirements?
Understand frequency and impact of a threat
Understand data reliability
Develop a collection plan
Produce actionable data

28. H&P, Inc. is a small-scale organization that has decided to outsource the network security
monitoring due to lack of resources in the organization. They are looking for the options where
they can directly incorporate threat intelligence into their existing network defense solutions.
Which of the following is the most cost-effective methods the organization can employ?
Recruit the right talent
Look for an individual within the organization
Recruit data management solution provider
Recruit managed security service providers (MSSP)

29. In which of the following attacks does the attacker exploit vulnerabilities in a computer
application before the software developer can release a patch for them?
Active online attack
Zero-day attack
Distributed network attack
Advanced persistent attack

30. An analyst is conducting threat intelligence analysis in a client organization, and during the
information gathering process, he gathered information from the publicly available sources and
analyzed to obtain a rich useful form of intelligence. The information source that he used is
primarily used for national security, law enforcement, and for collecting intelligence required for
business or strategic decision making.
Which of the following sources of intelligence did the analyst use to collect information?
OPSEC
ISAC
OSINT
SIGINT

31. Walter and Sons Company has faced major cyber attacks and lost confidential data. The
company has decided to concentrate more on the security rather than other resources.
Therefore, they hired Alice, a threat analyst, to perform data analysis. Alice was asked to
perform qualitative data analysis to extract useful information from collected bulk data.
Which of the following techniques will help Alice to perform qualitative data analysis?
Regression analysis, variance analysis, and so on
Numerical calculations, statistical modeling, measurement, research, and so on
Brainstorming, interviewing, SWOT analysis, Delphi technique, and so on
Finding links between data and discover threat-related information

32. Sarah is a security operations center (SOC) analyst working at JW Williams and Sons organization
based in Chicago. As a part of security operations, she contacts information providers (sharing
partners) for gathering information such as collections of validated and prioritized threat
indicators along with a detailed technical analysis of malware samples, botnets, DDoS attack
methods, and various other malicious tools. She further used the collected information at the
tactical and operational levels.
Sarah obtained the required information from which of the following types of sharing partner?

Providers of threat data feeds


Providers of threat indicators
Providers of comprehensive cyber-threat intelligence
Providers of threat actors

33. Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During
the data collection phase, he used a data collection method that involves no participants and is
purely based on analysis and observation of activities and processes going on within the local
boundaries of the organization.
Identify the type data collection method used by the Karry.

Active data collection


Passive data collection
Exploited data collection
Raw data collection

34. Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for
identifying emerging threats to the organization and implement essential techniques to prevent
their systems and networks from such attacks. Alice is searching for online sources to obtain
information such as the method used to launch an attack, and techniques and tools used to
perform an attack and the procedures followed for covering the tracks after an attack.
Which of the following online sources should Alice use to gather such information?

Financial services
Social network settings
Hacking forums
Job sites

35. ABC is a well-established cyber-security company in the United States. The organization
implemented the automation of tasks such as data enrichment and indicator aggregation. They
also joined various communities to increase their knowledge about the emerging threats.
However, the security teams can only detect and prevent identified threats in a reactive
approach.
Based on threat intelligence maturity model, identify the level of ABC to know the stage at which
the organization stands with its security and vulnerabilities.

Level 2: increasing CTI capabilities


Level 3: CTI program in place
Level 1: preparing for CTI
Level 0: vague whereto start

36. In which of the following storage architecture is the data stored in a localized system; server, or
storage hardware and capable of storing a limited amount of data in its database and locally
available for data usage?

Distributed storage
Object-based storage
Centralized storage
Cloud storage

37. In which of the following forms of bulk data collection are large amounts of data first collected
from multiple sources in multiple formats and then processed to achieve threat intelligence?

Structured form
Hybrid form
Production form
Unstructured form

38. Alison, an analyst in an XYZ organization, wants to retrieve information about a company’s
website from the time of its inception as well as the removed information from the target
website.
What should Alison do to get the information he needs.
Alison should use SmartWhois to extract the required website information.
Alison should use https://archive.org to extract the required website information.
Alison should run the Web Data Extractor tool to extract the required website information.
Alison should recover cached pages of the website from the Google search engine cache to
extract the required website information.

39. An XYZ organization hired Mr. Andrews, a threat analyst. In order to identify the threats and
mitigate the effect of such threats, Mr. Andrews was asked to perform threat modeling. During
the process of threat modeling, he collected important information about the treat actor and
characterized the analytic behavior of the adversary that includes technological details, goals,
and motives that can be useful in building a strong countermeasure.
What stage of the threat modeling is Mr. Andrews currently in?

System modeling
Threat determination and identification
Threat profiling and attribution
Threat ranking

40. Alice, an analyst, shared information with security operation managers and network operations
center (NOC) staff for protecting the organizational resources against various threats.
Information shared by Alice was highly technical and include threat actor TTI3s, malware
campaigns, tools used by threat actors, and so on Which of the following types of threat
intelligence was shared by Alice?
Strategic threat intelligence
Tactical threat intelligence
Technical threat intelligence
Operational threat intelligence
41. Sam works as an analyst in an organization named InfoTech Security. He was asked to collect
information from various threat intelligence sources. In meeting the deadline, he forgot to verify
the threat intelligence sources and used data from an open- source data provider, who offered it
at a very low cost Through it was beneficial at the initial stage but relying on such data providers
can produce unreliable data and noise putting the organization network into risk.
What mistake Sam did that led to this situation?

Sam used unreliable intelligence sources.


Sam used data without context.
Sam did not use the proper standardization formats for representing threat data
Sam did not use the proper technology to use or consume the information.

42. A network administrator working in an ABC organization collected log files generated by a traffic
monitoring system, which may not seem to have useful information, but after performing
proper analysis by him. the same information can be used to detect an attack in the network.
Which of the following categories of threat information has he collected?

Advisories
Strategic reports
Detection indicators
Low-level data

43. An organization suffered many major attacks and lost critical information, such as employee
records, and financial information. Therefore, the management decides to hire a threat analyst
to extract the strategic threat intelligence that provides high-level information regarding current
cyber-security posture, threats, details on the financial impact of various cyber-activities, and so
on.
Which of the following sources will help the analyst to collect the required intelligence?

Active campaigns, attacks on other organizations, data feeds from external third parties
OSINT, CTI vendors, ISAO/ISACs
Campaign reports, malware, incident reports, attack group reports, human intelligence
Human, social media, chat rooms

44. Tracy works as a CISO in a large multinational company. She consumes threat intelligence to
understand the changing trends of cyber security. She requires intelligence to understand the
current business trends and make appropriate decisions regarding new technologies, security
budget, improvement of processes, and staff. The intelligence helps her in minimizing business
risks and protecting the new technology and business initiatives.
Identify the type of threat intelligence consumer is Tracy.

Tactical users
Strategic users
Operational users
Technical users

45. An analyst wants to disseminate the information effectively so that the consumers can acquire
and benefit out of the intelligence.
Which of the following criteria must an analyst consider in order to make the intelligence
concise, to the point, accurate, and easily understandable and must consist of a right balance
between tables, narrative, numbers, graphics, and multimedia?
The right time
The right presentation
The right order
The right content

46. Joe works as a threat intelligence analyst with ?(security Inc. He is assessing the TI program by
comparing the project results with the original objectives by reviewing project charter. He is also
reviewing the list of expected deliverables to ensure that each of those is delivered to an
acceptable level of quality.
Identify the activity that Joe is performing to assess a TI program’s success or failure.

Determining the fulfillment of stakeholders


Identifying areas of further improvement
Determining the costs and benefits associated with the program
Conducting a gap analysis

47. Tyrion, a professional hacker, is targeting an organization to steal confidential information. He


wants to perform website footprinting to obtain the following information, which is hidden in
the web page header.
Connection status and content type
Accept-ranges and last-modified information
X-powered-by information
Web server in use and its version
Which of the following tools should the Tyrion use to view header content?
Hydra
AutoShun
Vanguard enforcer
Burp suite

48. Mr. Bob, a threat analyst, is performing analysis of competing hypotheses (ACH). He has reached
to a stage where he is required to apply his analysis skills effectively to reject as many
hypotheses and select the best hypotheses from the identified bunch of hypotheses, and this is
done with the help of listed evidence. Then, he prepares a matrix where all the screened
hypotheses are placed on the top, and the listed evidence for the hypotheses are placed at the
bottom.
What stage of ACH is Bob currently in?

Diagnostics
Evidence
Inconsistency
Refinement

49. SecurityTech Inc. is developing a TI plan where it can drive more advantages in less funds. In the
process of selecting a TI platform, it wants to incorporate a feature that ranks elements such as
intelligence sources, threat actors, attacks, and digital assets of the organization, so that it can
put in more funds toward the resources which are critical for the organization’s security.
Which of the following key features should SecurityTech Inc. consider in their TI plan for
selecting the TI platform?

Search
Open
Workflow
Scoring

50. During the process of threat intelligence analysis, John, a threat analyst, successfully extracted
an indication of adversary’s information, such as Modus operandi, tools, communication
channels, and forensics evasion strategies used by adversaries.
Identify the type of threat intelligence analysis is performed by John.

Operational threat intelligence analysis


Technical threat intelligence analysis
Strategic threat intelligence analysis
Tactical threat intelligence analysis

51. A threat analyst wants to incorporate a requirement in the threat knowledge repository that
provides an ability to modify or delete past or irrelevant threat data.
Which of the following requirement must he include in the threat knowledge repository to fulfill
his needs?
Data management
Protection ranking
Searchable functionality
Evaluating performance

52. How you can deduce a great deal about adversaries' TTPs

Exchanges of information about new exploits and tools being developed


Discussions of plans and tactics on forums and social media sites
Purchases of tools and services
All of these

53. Patch management is a essential task for managing


All of these
servers
endpoints
network and security devices
54. What is an example of Priority Intelligence Requirements (PIRs)
Identify notable threats to the organization
Describe threat reconnaissance activity that occurred today
Identify cyber threats targeting related industries
Identify the person, group, entity or asset in the organization that is being targeted

55. Identify the technique to draw symbols in public places for advertising an open Wi-Fi network.
Warchalking
Wardialing
Wardriving
Spamming
None of these
56. What is at the bottom level of Pyramid of Pain
TTP
IP address
Domain Names
Hash values
57. _______________ takes the forensic backups of systems that are the focus of an incident, in the
incident response team.
None of these
Information security representative
Legal representative
Lead investigator
Technical representative
58. Select the standard protocol used for interfacing external application software with a web
server.
IP
TCP
CGI
None of these
DHCP
59. Identify the honeypot (computer security mechanism) that gives an attacker access to the real
operating system without any restriction to gather vast information about the attacker.
Honeyd
High-interaction honeypot
Medium-interaction honeypot
None of these
Low-interaction honeypot

60. Priority Intelligence Requirements (PIRs) includes


Identify the person, group, entity or asset in the organization that is being targeted
Identify threat actors targeting our organization's critical assets or new technologies
All of these
Identify the threat actors' motives

61. Identify the threat modeling technique which is more for an application to meet the security
properties of confidentiality, integrity, and availability, along the experts of construct the data
flow diagram based on the threat model

Trike threat modeling


STRIDE threat modeling
P.A.S.T.A. threat modeling

62. Choose the network supporting mobile communications across an arbitrary wireless LANs and
satellite coverage areas.

Global Area Network (GAN)


None of these
Home Area Network (HAN)
Local Area Network (LAN)
Wide Area Network (WAN)

63. What characterizes threat Modeling


Is a process for capturing, organizing, and analyzing all of this information
This also helps make informed decision making about how secure the application security risk is
Is a structured representation of all the information that affects the security of an application.
All of these
64. What refers to capability of adversary to successfully achieve their intended goal
Intent
Threat
Capability
Impact
65. The goal of most APT attacks is
Use advanced exploits of zero-day vulnerabilities
To maintain ongoing access to the targeted network
Use spear phishing and other social engineering techniques
To get in and out as quickly as possible
66. What is not an emerging threat landscape areas
Internet of things
Cloud computing
Wireless network
Social media
67. What is the main purpose of CTI
Provide in-depth information on the threats that pose a greater risk to the organization's
infrastructure
Implement security measure to prevent data breaches
Collect information about potential attacks currently targeting the organization
None of these
68. How to determine domain and IP address reputation?
Test accessible servers for signs of compromise and malicious activities
All of these
Extract URLs from web pages and investigate to see if the source domains and websites appear
to be under the control of threat actors, or have been compromised by malware.
Analyze emails to see if they contain indicators of spam, phishing attacks, or fraud

69. Which step in CTI cinvolves prioritizing your objectives in adherence to your organization's core
values.
Processing
Collection
Analysis
Planning and Direction

70. How is policy compliance monitored?


All of these
Punishment of noncompliance
Enforce a code of conduct
Establish effective authorisation approval

You might also like