Quiz by cool
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q 1/20Score 0
Which of the following measures is not commonly used to assess thereat intelligence?29
Our brand new solo games combine with your quiz, on the same screen
Correct quiz answers unlock more play!
Which of the following measures is not commonly used to assess thereat intelligence?
What language is STIX based on?
Kolin is a penetration tester who works for a cybersecurity company. His firm was hired to conduct a penetration test against a health-care system, and Kolin is working to gain access to the system belonging to a hospital in that system. What term best describes Kolin's work?
Which one of the following attackers is most likely to be associated with an APT?
What organizations did the U.S. government help create to help share knowledge between organizations in specific verticals?
Which of the following threat actors typically has the greatest access to resources?
of the threat vectors listed here, which one is most commonly exploited by attackers who are at a distant location?
Which one of the following is the best example of a hacktivist group?
What type of assessment is particularly useful for identifying insider threat?
Cindy wants to send threat information via a standardized protocol specifically designed to exchange cyber threat information. What should she choose?
Greg believes that an attacker may have installed malicious firmware in a network device before it was provided to his organization by the supplier. What type of threat vector best describes this attack?
Ken is conducting threat research on Transport Layer Security (TLS) and would like to consult the authoritative reference for the protocol's technical specification. What resource would best meet his needs?
Subject matter experts
Wendy is scanning cloud-based repositories for sensitive information. Which one of the following should concern her most, if discovered in a public repository?
Open source data
which one of the following threat research tools is used to visually display information about the location of threat actors?
Vince recently received the hash values of malicious software that several other firms in his industry found installed on their systems after a compromise. What term best describes this information?
Teachers give this quiz to your class