Test 3

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

2.

Which of the following statements are TRUE based on the Workbench details
displayed in the exhibit? Select all that apply.

No analyst has begun investigation of this workbench


An automated response was put in place to deal with this type of event
An attempt to modify a registry entry was detected
This workbench shows that multiple endpoints were affected

4. Which of the following is NOT a characteristic of MITRE ATT&CK?



The information in the MITRE ATT&CK framework is community driven,
anyone can contribute to it
• The information in the MITRE ATT&CK framework is only available to
security software vendors
• The information in the MITRE ATT&CK framework is based on real work
observations
• MITRE ATT&CK is a knowledge base of adversary behavior and attack
techniques

4. The open-source file format used to exchange cyber threat intelligence is called
[answer]? Select the correct answer from the drop-down list.

STIX

You might also like