Tim is working as an analyst in an ABC organization. His organization had been facing many
challenges in converting the raw threat intelligence data into meaningful contextual information.
After inspection, he found that it was due to noise obtained from misrepresentation of data from
huge data collections. Hence, it is important to clean the data before performing data analysis using
techniques such as data reduction. He needs to choose an appropriate threat intelligence framework
that automatically performs data collection, filtering, and analysis for his organization.
Which of the following threat intelligence frameworks should he choose to perform such task?
Henry. a threat intelligence analyst at ABC Inc., is working on a threat intelligence program. He was
assigned to work on establishing criteria for prioritization of intelligence needs and requirements.
Which of the following considerations must be employed by Henry to prioritize intelligence
H&P, Inc. is a small-scale organization that has decided to outsource the network security monitoring
due to lack of resources in the organization. They are looking for the options where they can directly
incorporate threat intelligence into their existing network defense solutions.
Which of the following is the most cost-effective methods the organization can employ?
In which of the following attacks does the attacker exploit vulnerabilities in a computer application
before the software developer can release a patch for them?
An analyst is conducting threat intelligence analysis in a client organization, and during the
information gathering process, he gathered information from the publicly available sources and
analyzed to obtain a rich useful form of intelligence. The information source that he used is primarily
used for national security, law enforcement, and for collecting intelligence required for business or
strategic decision making.
Which of the following sources of intelligence did the analyst use to collect information?
Walter and Sons Company has faced major cyber attacks and lost confidential dat
a. The company has decided to concentrate more on the security rather than other resources.
Therefore, they hired Alice, a threat analyst, to perform data analysis. Alice was asked to perform
qualitative data analysis to extract useful information from collected bulk data.
Which of the following techniques will help Alice to perform qualitative data analysis?
Sarah is a security operations center (SOC) analyst working at JW Williams and Sons organization
based in Chicago. As a part of security operations, she contacts information providers (sharing
partners) for gathering information such as collections of validated and prioritized threat indicators
along with a detailed technical analysis of malware samples, botnets, DDoS attack methods, and
various other malicious tools. She further used the collected information at the tactical and
Sarah obtained the required information from which of the following types of sharing partner?
Karry, a threat analyst at an XYZ organization, is performing threat intelligence analysis. During the
data collection phase, he used a data collection method that involves no participants and is purely
based on analysis and observation of activities and processes going on within the local boundaries of
Identify the type data collection method used by the Karry.
Alice, a threat intelligence analyst at HiTech Cyber Solutions, wants to gather information for
identifying emerging threats to the organization and implement essential techniques to prevent their
systems and networks from such attacks. Alice is searching for online sources to obtain information
such as the method used to launch an attack, and techniques and tools used to perform an attack
and the procedures followed for covering the tracks after an attack.
Which of the following online sources should Alice use to gather such information?
ABC is a well-established cyber-security company in the United States. The organization
implemented the automation of tasks such as data enrichment and indicator aggregation. They also
joined various communities to increase their knowledge about the emerging threats. However, the
security teams can only detect and prevent identified threats in a reactive approach.
Based on threat intelligence maturity model, identify the level of ABC to know the stage at which the
organization stands with its security and vulnerabilities.