Professional Documents
Culture Documents
Repetir Threat Intelligence Services
Repetir Threat Intelligence Services
Question 1 What happens when each known malware file is represented by a one-to-one signature approach?
Correct
There are more vendor organizations that are able to keep up with the increasing number of malware files.
It does not scale well, because the number of malware files increases by millions or more each day.
The variations of malware are easily detected thanks to the affordability of malware kits.
Question 2 The threat intelligence service catalogs data about existing or emerging attacks, including the specific mechanisms of the attack, and
Incorrect evidence that the attack has happened.
0 points out of 1
What is this data also known as?
Select one:
Indicators of compromise
Intelligence catalogs
Machine learning
Artificial intelligence
Sandboxing
Sandboxing products take a suspect file and places it in an environment where its behaviors can be closely analyzed.
After some time, if nothing malicious is detected in the quarantined files, the sandbox declares them as safe and releases them
from quarantine.
Sandboxes can send the details to the vendor’s threat intelligence service so that the details can be shared worldwide.
https://training.fortinet.com/mod/quiz/review.php?attempt=2961822&cmid=53692 1/2
15/4/2020 Threat Intelligence Services
Question 4 In the early days of threat intelligence service, in which three timeframes were vendor updates released? (Choose three.)
Partially correct
Twice a year
Every week
Monthly
Quarterly
Security products and threat intelligence services that can act together in real time stand the best chance of stopping these
attacks.
Sharing intelligence among security vendors is the best way to fight threats.
https://training.fortinet.com/mod/quiz/review.php?attempt=2961822&cmid=53692 2/2