100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SANS FOR578 / GIAC GCTI CERTIFICATION EXAM PREP LATEST EXAM QUESTIONS AND VERIFIED ANSWERS GRADED A+ | WITH RATIONALESv

Rating
-
Sold
7
Pages
49
Grade
A
Uploaded on
15-01-2025
Written in
2024/2025

SANS FOR578 / GIAC GCTI CERTIFICATION EXAM PREP LATEST EXAM QUESTIONS AND VERIFIED ANSWERS GRADED A+ | WITH RATIONALES 2025

Institution
Sans Forensics
Course
Sans forensics











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Sans forensics
Course
Sans forensics

Document information

Uploaded on
January 15, 2025
Number of pages
49
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ESTUDY



SANS FOR578 / GIAC GCTI CERTIFICATION EXAM PREP
LATEST EXAM QUESTIONS AND VERIFIED ANSWERS
GRADED A+ | WITH RATIONALES
1. What is counterintelligence?
a) The process of gathering intelligence on competitors
b) The identification, assessment, and neutralisation of adversary intelligence activities
c) The analysis of internal organizational threats
d) The development of cybersecurity tools
Answer: b) The identification, assessment, and neutralisation of adversary intelligence
activities
Rationale: Counterintelligence focuses on identifying and mitigating adversarial intelligence
efforts that threaten an organization.

2. Which type of memory is the most critical in intelligence analysis and why?
a) Long-term memory, as it stores historical data
b) Working memory, as it processes inputs and determines storage
c) Sensory memory, as it captures immediate inputs
d) Short-term memory, as it retains recent information
Answer: b) Working memory, as it processes inputs and determines storage
Rationale: Working memory is critical because it processes incoming data and decides whether
to store it in long-term or short-term memory.

3. What is template matching?
a) A theory that objects are stored as templates in long-term memory
b) A method for comparing malware signatures
c) A technique for identifying network anomalies
d) A process for mapping threat actors
Answer: a) A theory that objects are stored as templates in long-term memory
Rationale: Template matching suggests that the brain processes and stores objects as templates
for future recognition.

4. Compare System 1 and System 2 thinking.
a) System 1 - analytical, slow; System 2 - intuitive, fast
b) System 1 - intuitive, fast; System 2 - analytical, slow
c) System 1 - methodical, slow; System 2 - creative, fast
d) System 1 - logical, fast; System 2 - emotional, slow
Answer: b) System 1 - intuitive, fast; System 2 - analytical, slow
Rationale: System 1 is fast and intuitive, while System 2 is slow and analytical, requiring
deliberate effort.

,ESTUDY


5. Which system of thinking requires mental models?
a) System 1
b) System 2
c) Both System 1 and System 2
d) Neither System 1 nor System 2
Answer: a) System 1
Rationale: System 1 relies on mental models for quick, intuitive decision-making.

6. What is an activity group?
a) A single intrusion event
b) A clustering of intrusions covering two or more phases in the Diamond Model
c) A group of unrelated cyber incidents
d) A collection of malware samples
Answer: b) A clustering of intrusions covering two or more phases in the Diamond Model
Rationale: An activity group represents a series of related intrusions across multiple phases of
an attack.

7. What is a key indicator?
a) An indicator that changes frequently
b) An indicator that remains constant across multiple intrusions and uniquely distinguishes a
campaign
c) An indicator used only for internal analysis
d) An indicator that is irrelevant to threat detection
Answer: b) An indicator that remains constant across multiple intrusions and uniquely
distinguishes a campaign
Rationale: Key indicators are consistent across intrusions and help identify specific campaigns.

8. What is a Collection Management Framework (CMF)?
a) A plan for how, where, and what type of data is collected
b) A tool for analyzing malware
c) A method for sharing intelligence
d) A framework for threat modeling
Answer: a) A plan for how, where, and what type of data is collected
Rationale: A CMF outlines the strategy for data collection to support intelligence requirements.

9. What three aspects make up a threat?
a) Intent, Capability, Opportunity
b) Risk, Vulnerability, Impact
c) Detection, Prevention, Response
d) Planning, Execution, Review
Answer: a) Intent, Capability, Opportunity
Rationale: A threat is defined by the adversary’s intent, capability, and opportunity to act.

,ESTUDY


10. Which level of effort is required to change a domain name according to the Pyramid of Pain?
a) Simple
b) Moderate
c) Difficult
d) Impossible
Answer: a) Simple
Rationale: Changing a domain name is relatively easy for adversaries, making it a low-effort
task.

11. What is the importance of understanding intelligence collection on a technical level?
a) It ensures analysts understand the limitations of their data sources
b) It eliminates the need for human analysis
c) It focuses only on high-level strategic intelligence
d) It reduces the need for collaboration
Answer: a) It ensures analysts understand the limitations of their data sources
Rationale: Technical understanding helps analysts assess the reliability and scope of collected
data.

12. What is counterintelligence?
a) The identification, assessment, neutralisation, and exploitation of adversarial entities
b) The process of gathering competitor data
c) The analysis of internal threats
d) The development of cybersecurity tools
Answer: a) The identification, assessment, neutralisation, and exploitation of adversarial
entities
Rationale: Counterintelligence involves identifying and mitigating adversarial threats while
exploiting their activities.

13. Understanding your organization’s vulnerabilities using models and configuration analysis is
what type of threat detection?
a) Environmental
b) Behavioral
c) Signature-based
d) Anomaly-based
Answer: a) Environmental
Rationale: Environmental threat detection focuses on understanding vulnerabilities specific to
an organization’s infrastructure.

14. Which TLP level allows intelligence to be shared online?
a) TLP: Red
b) TLP: Amber
c) TLP: Green
d) TLP: White

, ESTUDY


Answer: d) TLP: White
Rationale: TLP: White allows information to be shared publicly, including online.

15. On the sliding scale of cybersecurity, what category involves analysts responding to and
learning from adversaries on their network?
a) Passive Defense
b) Active Defense
c) Intelligence Gathering
d) Threat Hunting
Answer: b) Active Defense
Rationale: Active Defense involves real-time interaction with adversaries to mitigate threats.

16. Before satisfying an intelligence requirement, what must an analyst do to determine if it is
achievable?
a) Determine whether they have enough data to satisfy the requirement
b) Ignore the requirement if it is too complex
c) Share the requirement with external partners
d) Focus only on high-priority threats
Answer: a) Determine whether they have enough data to satisfy the requirement
Rationale: Analysts must assess data availability to determine if the requirement can be met.

17. What TLP level allows you to share intelligence within your community?
a) TLP: Red
b) TLP: Amber
c) TLP: Green
d) TLP: White
Answer: c) TLP: Green
Rationale: TLP: Green permits sharing within a specific community or group.

18. IOCs are used to improve signatures of an organization’s NIDS. What category on the sliding
scale of security does this fall under?
a) Passive Defense
b) Active Defense
c) Intelligence Gathering
d) Threat Hunting
Answer: a) Passive Defense
Rationale: Improving NIDS signatures using IOCs is a passive defense measure.

19. How can intelligence teams prevent bias?
a) Use of Structured Analytic Techniques (SATs)
b) Rely solely on automated tools
c) Ignore conflicting data
d) Focus only on high-confidence intelligence

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Estudyr Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1153
Member since
3 year
Number of followers
828
Documents
10844
Last sold
22 hours ago
ESTUDY

Get best related and owned assignment help online, this is your youngest Proffesor around.Be Smart! , I will be sharing all materials, Nclex, study guides, tests, Question ,Answers and Rationales , test banks, Hesi questions, etc. on my page for , All are based on my experiences with Nursing school.| Feel free to message me with any questions, happy to help!

3.9

205 reviews

5
102
4
42
3
27
2
11
1
23

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions