0
0
Cybersecurityknowledge~10 mins

Threat intelligence feeds in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to define what a threat intelligence feed provides.

Cybersecurity
A threat intelligence feed provides [1] about potential cyber threats.
Drag options to blanks, or click blank then click option'
Adata
Bhardware
Csoftware
Dnetworks
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing hardware or software instead of data.
2fill in blank
medium

Complete the sentence to identify a common format used in threat intelligence feeds.

Cybersecurity
One common format for sharing threat intelligence data is [1].
Drag options to blanks, or click blank then click option'
APDF
BJPEG
CMP3
DSTIX
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing unrelated file formats like PDF or JPEG.
3fill in blank
hard

Fix the error in the sentence about the purpose of threat intelligence feeds.

Cybersecurity
Threat intelligence feeds are used to [1] new software features.
Drag options to blanks, or click blank then click option'
Adetect
Bdelete
Cinstall
Ddevelop
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing develop or install instead of detect.
4fill in blank
hard

Fill both blanks to complete the description of how threat intelligence feeds are used.

Cybersecurity
Organizations use threat intelligence feeds to [1] indicators of compromise and [2] their security systems.
Drag options to blanks, or click blank then click option'
Acollect
Bignore
Cupdate
Ddelete
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing ignore or delete instead of collect and update.
5fill in blank
hard

Fill all three blanks to complete the sentence about types of data in threat intelligence feeds.

Cybersecurity
Threat intelligence feeds often include [1], [2], and [3] to help identify threats.
Drag options to blanks, or click blank then click option'
AIP addresses
Bmalware hashes
Cdomain names
Duser passwords
Attempts:
3 left
💡 Hint
Common Mistakes
Including user passwords as part of threat intelligence data.