1. What part of the Diamond Model represents the threat actor?
- adversary
- infrastructure
- direction
- capability
- result
- victim
2. What part of the Diamond model represents the network path that is used for an exploit?
- adversary
- infrastructure
- direction
- capability
- result
- victim
3. What part of the Diamond Model represents the target of an exploit?
- adversary
- infrastructure
- direction
- capability
- result
- victim
4. Which meta-feature represents what the threat actor gained from an exploit? It can be characterized as confidentially compromised, integrity compromised, and availability compromised.
- adversary
- infrastructure
- direction
- capability
- result
- victim
5. What part of the Diamond Model represents the tools or techniques that the threat actor uses to attack a target?
- adversary
- infrastructure
- direction
- capability
- result
- victim
6. Which meta-feature of the Diamond Model indicates the path between the parts of the Diamond Model that is used by an exploit?
- adversary
- infrastructure
- direction
- capability
- result
- victim