Cyber Threat Intelligence Quiz

Test your knowledge of Cyber Threat Intelligence concepts, ethics, and best practices.

Why is it important to conduct a post-project review after an intelligence-led security engagement?

Under the UK Computer Misuse Act (1990), which of the following actions would be considered illegal?

Which of the following is a key requirement under the EU GDPR that affects cyber threat intelligence collection?

A threat intelligence team wants to monitor a criminal dark web forum where stolen credentials are being traded. Which legal consideration is the most important?

The CREST Code of Conduct emphasizes which ethical obligation for threat intelligence professionals?

Your team discovers a serious vulnerability in a widely used open-source software during a security engagement. What is the most ethical way to handle this discovery?

What is the primary goal of Advanced Persistent Threat (APT) groups?

What is an example of a watering hole attack?

How does DNS tunneling allow attackers to bypass security controls?

A ransomware variant encrypts files using a hybrid cryptographic approach. What does this mean?

Why is it difficult to attribute nation-state cyber attacks with high confidence?

What is the most important factor when prioritizing intelligence requirements for an organization?

Why is stakeholder communication crucial in intelligence-led engagements?

A cybersecurity analyst discovers a database of stolen credentials online. What is the most legally sound course of action?

Under the UK Regulation of Investigatory Powers Act (RIPA) 2000, which activity is restricted?

np