Preview Mode — This PBQ requires a Premium Membership and is being shown in a read-only preview mode.     See Plans

Threat Intelligence Matching

This exercise covers various types of threat intelligence, enabling students to identify and categorize data sources, formats, and frameworks.

Some options will have multiple correct answers.


OpenIOC
Log Files
Phishing URL
Threat Feed
APT
Threat Indicator
Honeypot
CSV File
YARA Rules
Kill Chain
MITRE ATT&CK
STIX
Cyber Threat Alliance
IP Address
TTP
Domain Name
Observable Data
Threat Intelligence Sharing Organization
Framework for Threat Attribution
Structured Data Format
Advanced Persistent Threat
Threat Detection Patterns
System-based Data Source
Tactics Techniques and Procedures
Data Source for Security Analysis
Network-based Data Source
Subscription-Based Intelligence
Threat Data Collection Tool
Threat Intelligence Format
Threat Intelligence Framework