identifying anomalies that may point to a potential prob-
The CIO of a financial datacenter creates a threat assess-
ment matrix. Which factor helps to identify threats as they
relate to specific industries?
A.) Timeliness
B.) Accuracy
C.) Confidence
D.) Relevancy
A security firm hires a new cybersecurity analyst. The CIO
mentions that he hired the candidate due to having ex-
ceptional soft skills. Which relevant skills to the position
does the CIO refer to? Select all that apply.
A.) Creative thinking
B.) Problem solving
C.) Software development
D.) Information protection
The security intelligence lifecycle includes the process of
, solving
Answer: D. Relevancy
Soft skills are just as important as technical skills. Creative
Some threat intelligence sources highly focus on
thinking skills allow an individual to envision and consider
specific industries, such as healthcare, and the insights
different approaches to an issue at hand.
generatedmay not be as relevant to other sectors.
Problem solving skills are useful in approaching and con-
Threats diminish or change and evolve. Admin should
sidering a resolution to an incident. Such skills allow for an
make assessments as to whether an intelligence
individual to consider all possibilities, both traditional and
sourcecan research and disseminate updates in a
non-traditional, and the steps required within to remedy
timely man-ner.
a situation.
Accuracy means showing that any information produced
Software development is a technical skill required to create
is validated and true. Accuracy can also refer to whether
functional software applications.
any intelligence is of a general or specific nature.
Information protection refers to the steps and processes
When publishing a data point or analyst observation,
that enable the safekeeping and security of electronic
the act of publishing lends the point a certain authority.
data.
Answer: A.) Creative
thinking and B.) Problem
lem. In which phase does this activity take place?
,Answer: B.) Analysis
Once a system captures and normalizes data, an admin
uses analysis to identify anomalies that may point to a
potential problem.
The final phase of the cycle is one of feedback and review,
utilizing the input of both intelligence producers and in-
telligence consumers. A goal of this phase is to improve
the implementation of the requirements.
The dissemination phase refers to publishing information
produced by analysis to consumers who need to act on
the insights developed.
Software suites usually implement the collection phase
in the life cycle, such as security information and event
management (SIEM).
Answer: B.) Dissemination
The IT department at a medium-sized manufacturer, deals The dissemination phase refers to publishing information
with cyber threats daily. In response to the growing level of produced by analysis, to consumers who need to act on
malicious activity, the IT manager establishes guidelines the insights developed.
based on the security intelligence lifecycle. Which phase The final phase of the cycle is one of feedback and review,
of the lifecycle does the IT manager use to distribute utilizing the input of both intelligence producers and in-
information to executives? telligence consumers. A goal of this phase is to improve
the implementation of the requirements.
A.) Feedback Once the system captures and normalizes the data, admin
B.) Dissemination analyzes the data to identify anomalies that may point to
C.) Analysis a potential problem.
D.) Collection Software suites usually implement the lifecycle collec-
tion, such as security information and event management
(SIEM).
A client asks a security analyst to construct a security plan
for a small business. The resulting plan outlines several
,
suggested controls. One such control is the placement