Check answers here:
Modules 26 – 28: Analyzing Security Data Group Exam (Answers)
Quiz-summary
0 of 5 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
Information
Modules 26 - 28: Analyzing Security Data Group Exam - Test online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- Answered
- Review
-
Question 1 of 5
1. Question
1 pointsMatch the intrusion event defined in the Diamond Model of intrusion to the description.Correct
Incorrect
-
Question 2 of 5
2. Question
1 pointsWhat two shared sources of information are included within the MITRE ATT&CK framework? (Choose two.)Correct
Incorrect
-
Question 3 of 5
3. Question
1 pointsWhat information is gathered by the CSIRT when determining the scope of a security incident?Correct
Incorrect
-
Question 4 of 5
4. Question
1 pointsAccording to NIST standards, which incident response stakeholder is responsible for coordinating an incident response with other stakeholders to minimize the damage of an incident?Correct
Incorrect
-
Question 5 of 5
5. Question
1 pointsAccording to NIST, which step in the digital forensics process involves drawing conclusions from data?Correct
Incorrect
Finally done with all the diagrams, short names and token action words -,-