Preview Mode — This PBQ requires a Premium Membership and is being shown in a read-only preview mode.     See Plans

Threat Intelligence Matching

This exercise covers various types of threat intelligence, enabling students to identify and categorize data sources, formats, and frameworks.

Some options will have multiple correct answers.


Cyber Threat Alliance
IP Address
Kill Chain
Domain Name
Honeypot
STIX
APT
Threat Indicator
CSV File
Log Files
MITRE ATT&CK
Threat Feed
TTP
Phishing URL
OpenIOC
YARA Rules
Framework for Threat Attribution
Observable Data
Subscription-Based Intelligence
Tactics Techniques and Procedures
Structured Data Format
Data Source for Security Analysis
Threat Intelligence Sharing Organization
Advanced Persistent Threat
Threat Intelligence Framework
Network-based Data Source
Threat Detection Patterns
System-based Data Source
Threat Intelligence Format
Threat Data Collection Tool