Threat Intel TM100B Skills Check
Skills Check Summary
0 of 10 Questions completed
You have already completed the skills check before. Hence you can not start it again.
Skills Check is loading…
You must sign in or sign up to start the skills check.
You must first complete the following:
0 of 10 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
What term refers to the phase in which adversaries discover and collect information on the system and the victim, effectively planning their actions?
What is the term for a program or software that is designed to damage, disrupt, or gain unauthorized access to a computer system?
In which phase of the Cyber Kill Chain would an adversary run a Nmap scan on the target network?
During which phase of the Cyber Kill Chain does data exfiltration occur?
In which phase of the Cyber Kill Chain can an attacker use malware to assume remote control of a device or identity within the target network?
What is the term for a deliberately vulnerable security tool designed to attract attackers and record the actions of adversaries?
Which of the following is a series of tools and applications that monitor devices for an activity that could indicate a threat or security breach?
What is the term for the component of the Endpoint Detection and Response (EDR) that monitors the events and processes of a system?
Which of the following refers to a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period?
The act of going from a lower permission account to a higher permission one is known as Privilege Escalation.