본문 바로가기

Certification/[FCF] Fortinet Certified Fundamentals

[FCF] Threat Landscape - Module 2 : Quesion&Answer

Q. Which expression would best qualify as threat intelligence?
Select one:

- A list of malicious IP addresses and domain names
- Data feeds from a Security Information and Event Manager (SIEM)
- Security implications and actionable advice
- News of a cyberattack on another organization’s network


Q. Which three requisite qualities must information have for it to be threat intelligence? (Choose three.)
Select one or more:

- Relevant
- Detailed
- Actionable
- Contextual
- Timely


Q. Which hacker type is someone employed by a computer security consulting firm who could be hired to do penetration testing?
Select one:

- Blue hat 
- Black hat
- Grey hat
- Green hat


Q. Which bad actor type is motivated by notoriety?
Select one:

- Adventurer
- Cyber terrorist
- Cybercriminal 
- Explorer


Q.Which step is the final action in the threat intelligence process?
Select one:

- Identifying which threats must be mitigated
- Disseminating threat information
- Providing feedback and a review of lessons learned
- Eliminating threats


Q. Which two attack vector categories characterize a ransomware attack? (Choose two.)
Select one or more:

- Computer technology
- Human
- Post-exploit
- Pre-exploit

Q. What are the two ingredients of a successful social engineering attack? (Choose two.)
Select one or more:

- Breaching the victim’s computer by exploiting a weakness in an application
- Gaining the trust of the victim 
- Denying the victim access to a server or service
- Stealing the victim’s credentials by watching them as they log in
- Compelling the victim to act, such as instilling a sense of urgency


Q. Which standard develops a common language for cyberthreat information?
Select one:

- Common vulnerability scoring system (CVSS)
- Structured threat information expression (STIX) 
- Cyberthreats vernacular (CTV)
- MITRE ATT&CK


Q. Which bad actor type is motivated by ideology?
Select one:

- Cyber ideologue
- Hacktivist 
- Cyber warrior
- Explorer


Q. Manipulating people to do something contrary to their interests is an example of which cybersecurity threat category?
Select one:

- Social engineering 
- System design failure
- Unauthorized access
- Malware

 

 80% 넘으면 Pass니까 위에 참고해서 파이팅합시다!

틀린 부분있으면 알려주세요 바로 수정하겠습니다!