X-Force Threat Intelligence Level 2 Quiz - Attempt

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Started on Wednesday, March 20, 2024, 10:52 AM

State Finished
Completed on Wednesday, March 20, 2024, 11:23 AM
Time taken 31 mins 5 secs Back Next
Feedback Congratulations, you passed the X-Force
Threat Intelligence Level 2 Quiz!

Question 1

Correct

Points out of 1.00

Which commercial platform uses IBM X-Force Threat


Intelligence malware detection rules?

Sentinel

Kaspersky

Virus Total 

Recorded future

Question 2

Correct

Points out of 1.00

How many different premium report types are available in X-


Force Threat Intelligence?

Six

Two

Five 

Three
Question 3

Correct

Points out of 1.00

Back Next

Your client is looking to reduce security complexity and context


switching to gain Security Operations Center (SOC) efficiency
and save current security tools investment. Which solution do
you offer first?

QRadar EDR

QRadar XDR

QRadar XDR Connect 

QRadar NDR

Question 4

Correct

Points out of 1.00

While investigating an incident, entities and their context are


essential to understanding the incident's scope and nature.
Some of these entities can be surfaced as IOC's for matching
with future event logs. What does IOC stand for?

Indicators of compliance

Information of compliance

Information of compromise

Indicators of compromise 
Question 5

Correct

Points out of 1.00

Back Next

You just introduced QRadar XDR Connect cloud-native open


XDR solution to your prospective client. You discuss how it
saves client time by connecting your tools, workflows, insights,
and people. Which of the following product does NOT work with
IBM QRadar XDR Connect?

NDR

EDR

XGS connect 

SIEM

Question 6

Incorrect

Points out of 1.00

A client is looking for data on recent ransomware attacks.


According to the Cost of a data breach 2022 report, what
percentage did ransomware breaches increase from 2021 to
2022?

41%

31%

21% 

50%
Question 7

Correct

Points out of 1.00

Back Next

Threat attacks are constantly rising like never before, and


Security Operation Center (SOC) analysts need quick ways to
triage through their incidents and take relevant actions. What
information do Early Warning research reports provide a
security analyst?

Threat groups

Malicious domains 

Indicators of compromise

Indicators of compliance

Question 8

Correct

Points out of 1.00

IBM QRadar XDR Connect is a set of extended detection and


response capabilities running on an open security platform.
Which of the following is NOT considered as XDR Connect
capability?

Automates Security operation

Single pane of glass

Replaces need for Security information and event 


management (SIEM)

Connects disparate tools


Question 9

Correct

Points out of 1.00

Back Next

A prospective client is looking to improve its SOC operations


and believes too much time goes into researching global
threats and threat groups. Which solution do you propose to
augment their resources capability quickly without significant
upfront investment?

Endpoint detection response

Advanced Threat Protection Feed Threat intelligence 

Network detection response

Extended detection response

Question 10

Correct

Points out of 1.00

Threat Intel empowers enterprises with the latest insights to


counter cyberattacks. Which IBM product will provide access to
the advanced Threat Protection feed for a prospective client
looking to improve its security tools detection?

XDR Connect

CP4S

X-Force Exchange 

QRadar
Question 11

Incorrect

Points out of 1.00

Back Next

How many IOCs are processed per day by IBM X-Force global
investigations and research?

Thousands

Hundreds

Millions 

Billions

Question 12

Correct

Points out of 1.00

IBM X-Force threat feeds are generated automatically in real-


time and aggregate high-quality data from multiple reliable
sources around the world. Which feed format is NOT supported
in the X-Force Threat Intelligence Advanced Threat Protection
feed?

Comma-Separated Values (CSV)

Structured Threat Information eXpression/Trusted


Automated eXchange of Intelligence Information

Text

Portable Document Format (PDF) 


Question 13

Correct

Points out of 1.00

Back Next

IBM X-Force empowers enterprises with the latest insights to


counter cyberattacks. On average, how many malicious
domains are blocked by Quad9 per day?

60 thousand

Six million

60 million 

Three million

Question 14

Correct

Points out of 1.00

Your client is interested in hearing about IBM X-Force solution


differentiators. How many days earlier than its competition
does X-Force identify malicious domains?

One day earlier than its competition

Eight days earlier than its competition 

One hour earlier than its competition

Two days earlier than its competition


Question 15

Correct

Points out of 1.00

Back Next

IBM X-Force Threat Intelligence features, such as Threat


hunting and Threat research, are available to clients via which
of the following means?

Web interface and Application programming interface 

Direct intelligence feeds

Web interface

Application programming interface

Question 16

Correct

Points out of 1.00

Security analysts want to act fast against undergoing/upcoming


attacks. What report provides information on malicious
domains?

Early warning report 

Industry analysis

Malware analysis

Threat activity
Question 17

Correct

Points out of 1.00

Back Next

Which of the following is NOT considered a part of X-Force


Exchange premium reports?

Threat group

Malware analysis

Threat activity

DNS warning 

Question 18

Correct

Points out of 1.00

Your client is interested in IBM's open-platform security


solution. Which IBM security product do you recommend that
can also offer Threat Intelligence Insights capability?

X-Force Exchange API

XDR Connect (CP4S) Threat Intelligence Insights 

X-Force Exchange Threat intelligence sharing platform

X-Force Exchange API Commercial/Enterprise


Question 19

Correct

Points out of 1.00

Back Next

X-Force collects threat intelligence from multiple sources. How


many endpoints of information visibility help build X-Force
threat intelligence?

Six million

270 million plus 

Three million

One million

Question 20

Correct

Points out of 1.00

Zero trust is a strategy and action plan to lead to better cyber


defense and higher security posture with a more mature
cyberculture and skill competency. A client of yours wants to
know more about the IBM Security Shield. What are the four
building blocks of IBM Security Shield?

Intelligence, Malware, Endpoints, and Cloud

Manage, Modernize, Improve, and Collaborate

Manage, Model, Advise, and Protect

Align, Protect, Manage, and Modernize 


Question 21

Correct

Points out of 1.00

Back Next

Cyber analysts mainly use threat intelligence to discover the


source, cause, and purpose. At the same time, client executives
with a baseline of threats to their industry and the future
landscape assess risks and assign resources. Which of the
report targeted to assist executives and is available with the X-
Force threat intelligence premium subscription?

Industry threat groups report

Industry summary

Industry analysis 

Industry threats report

Question 22

Incorrect

Points out of 1.00

IBM continues to evolve its security solution to meet its client's


needs. Which key segments are NOT considered addressable
by IBM Security (from total worldwide security opportunity)?

Infrastructure protection 

Identity and access management

Cloud security

Data security
Question 23

Incorrect

Points out of 1.00

Back Next

IBM X-Force empowers enterprises with the latest insights to


counter cyberattacks. Which group does X-Force observe as the
top 2021 threat actor group?

Estranged employees 

Nation-states

Criminals

Hactivists

Question 24

Incorrect

Points out of 1.00

During a meeting with a client, you mention IBM's relationship


with Quad9 and how we curate information collected from
Quad9. How many points of presence does Quad9 use to build
its malicious domains list?

150+

150 

250+

100
Question 25

Incorrect

Points out of 1.00

Back Next

Threat intelligence is a foundational component of a modern


cybersecurity program. X-Force Threat Intelligence threat
observables and indicators do NOT include?

Vulnerabilities

Tactics, Techniques, and Procedures

Threat groups 

IP reputation

You might also like