Threat Intel TM100B Skills Check
Skills Check Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the skills check before. Hence you can not start it again.
Skills Check is loading…
You must sign in or sign up to start the skills check.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
What term refers to the phase in which adversaries discover and collect information on the system and the victim, effectively planning their actions?
-
Question 2 of 10
2. Question
What is the term for a program or software that is designed to damage, disrupt, or gain unauthorized access to a computer system?
-
Question 3 of 10
3. Question
In which phase of the Cyber Kill Chain would an adversary run a Nmap scan on the target network?
-
Question 4 of 10
4. Question
During which phase of the Cyber Kill Chain does data exfiltration occur?
-
Question 5 of 10
5. Question
In which phase of the Cyber Kill Chain can an attacker use malware to assume remote control of a device or identity within the target network?
-
Question 6 of 10
6. Question
What is the term for a deliberately vulnerable security tool designed to attract attackers and record the actions of adversaries?
-
Question 7 of 10
7. Question
Which of the following is a series of tools and applications that monitor devices for an activity that could indicate a threat or security breach?
-
Question 8 of 10
8. Question
What is the term for the component of the Endpoint Detection and Response (EDR) that monitors the events and processes of a system?
-
Question 9 of 10
9. Question
Which of the following refers to a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period?
-
Question 10 of 10
10. Question
The act of going from a lower permission account to a higher permission one is known as Privilege Escalation.