Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Examen

SANS FOR578 - GIAC GCTI exam questions with answers

Note
-
Vendu
-
Pages
40
Grade
A+
Publié le
04-07-2025
Écrit en
2024/2025

SANS FOR578 - GIAC GCTI exam questions with answers

Établissement
SANS FOR578
Cours
SANS FOR578











Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
SANS FOR578
Cours
SANS FOR578

Infos sur le Document

Publié le
4 juillet 2025
Nombre de pages
40
Écrit en
2024/2025
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

SANS FOR578 / GIAC GCTI exam questions
|\ |\ |\ |\ |\ |\ |\




with answers |\




What is counterintelligence? - CORRECT ANSWERS ✔✔The
|\ |\ |\ |\ |\ |\ |\


identification, assessment, and neutralisation of adversary |\ |\ |\ |\ |\ |\


intelligence activities. |\




Which type of memory is the most critical in intel analysis and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


why? - CORRECT ANSWERS ✔✔Working memory as it processes
|\ |\ |\ |\ |\ |\ |\ |\ |\


inputs and determines whether to store them for long or short
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


term memory
|\




What is template matching? - CORRECT ANSWERS ✔✔Theory that
|\ |\ |\ |\ |\ |\ |\ |\


every object is processed by the brain and stored as a template
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


in long term memory
|\ |\ |\




Compare system 1 and 2 thinking - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔System 1 - intuitive, fast, effective |\ |\ |\ |\ |\




System 2 - analytical, slow, methodical
|\ |\ |\ |\ |\




Which system of thinking requires mental models? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔System 1 |\ |\

,What is an activity group? - CORRECT ANSWERS ✔✔A clustering
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


of intrusions which cover 2 or more phases in the diamond model
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




What is a key indicator? - CORRECT ANSWERS ✔✔An indicator
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


that remains constant across multiple intrusions, uniquely
|\ |\ |\ |\ |\ |\ |\


distinguishes a campaign from other campaigns, and aligns to a |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


single category of adversary action.
|\ |\ |\ |\




What is a Collection Management Framework (CMF)? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔A CMF is the plan for how you collect data, where
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


you collect it, and what type of data you collect.
|\ |\ |\ |\ |\ |\ |\ |\ |\




What 3 aspects make up a threat? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Intent, Capability, Opportunity |\ |\




Which level of effort is required to change a domain name
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


according to the pyramid of pain? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Simple


What is the importance of understanding intelligence collection
|\ |\ |\ |\ |\ |\ |\ |\


on a technical level? - CORRECT ANSWERS ✔✔Ensures analyst
|\ |\ |\ |\ |\ |\ |\ |\ |\


understands limitations of their data sources |\ |\ |\ |\ |\




What is counter intelligence? - CORRECT ANSWERS ✔✔The
|\ |\ |\ |\ |\ |\ |\ |\


identification, assessment, neutralisation, and exploitation of |\ |\ |\ |\ |\ |\


adversarial entities. |\

,Understanding your organizations vulnerabilities using models |\ |\ |\ |\ |\ |\


and config analysis is what type of threat detection? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Environmental |\




Which TLP level allows intel to be shared online? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔TLP: White |\ |\




On the sliding scale of cyber security, what category to analysts
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


respond to and learn from adversaries on their network? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔Active Defence |\ |\ |\




Before satisfying an intel requirement, what must an analyst do
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


to determine if it is achievable? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Determine whether they have enough data to satisfy the |\ |\ |\ |\ |\ |\ |\ |\ |\


requirement. A Collection Management Framework (CMF) defines |\ |\ |\ |\ |\ |\ |\


how you collect data.|\ |\ |\




What TLP level allows you to share intel within your community? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔TLP:Green
|\ |\ |\




IOCs are used to improve signatures of an organizations NIDS,
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


what category on the sliding scale of security does this all under?
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


- CORRECT ANSWERS ✔✔Passive Defence
|\ |\ |\ |\ |\




How can intel teams prevent bias? - CORRECT ANSWERS ✔✔Use
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


of Structured Analytic Techniques (SATs)
|\ |\ |\ |\ |\




Inclusion of diversity |\ |\

, Questioning the ROI and reduction of risk of security intel
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


functions within an organization is an example of what category
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


of intelligence? - CORRECT ANSWERS ✔✔Strategic
|\ |\ |\ |\ |\




What is synthesis in CTI field? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Combination of various event data sources, historical |\ |\ |\ |\ |\ |\ |\


information, and digital forensics to form a theory or system
|\ |\ |\ |\ |\ |\ |\ |\ |\




What is a priority intelligence requirement (PIR)? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Intelligence requirements that are seen as critical
|\ |\ |\ |\ |\ |\ |\ |\


to mission success.
|\ |\




Which non-linear approach to modelling was meant to eliminate
|\ |\ |\ |\ |\ |\ |\ |\ |\


stovepiping that occurs in intel work? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\


✔✔Target-centric intelligence |\




What is bouncing malware? - CORRECT ANSWERS ✔✔User is
|\ |\ |\ |\ |\ |\ |\ |\ |\


passed between multiple sites and numerous exploits used in
|\ |\ |\ |\ |\ |\ |\ |\ |\


convoluted combinations |\




Give 2 common examples of protocols used as delivery methods
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


for malware - CORRECT ANSWERS ✔✔SMTP
|\ |\ |\ |\ |\




HTTP


Which part of the CoA matrix involves hacking back? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Destroy |\
€19,47
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
EXAMSTUDYPLUG Stanford University
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
305
Membre depuis
3 année
Nombre de followers
107
Documents
18112
Dernière vente
6 heures de cela
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Lire la suite Lire moins
4,5

230 revues

5
155
4
50
3
13
2
5
1
7

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions