Preview Mode — This PBQ requires a Premium Membership and is being shown in a read-only preview mode.     See Plans

Threat Intelligence Matching

This exercise covers various types of threat intelligence, enabling students to identify and categorize data sources, formats, and frameworks.

Some options will have multiple correct answers.


STIX
APT
OpenIOC
Honeypot
Kill Chain
YARA Rules
Cyber Threat Alliance
Log Files
MITRE ATT&CK
Phishing URL
Threat Indicator
Threat Feed
IP Address
Domain Name
CSV File
TTP
Observable Data
Threat Data Collection Tool
Network-based Data Source
Threat Intelligence Framework
Threat Intelligence Format
Data Source for Security Analysis
Threat Intelligence Sharing Organization
Framework for Threat Attribution
Threat Detection Patterns
Advanced Persistent Threat
Subscription-Based Intelligence
Structured Data Format
System-based Data Source
Tactics Techniques and Procedures