Cyber Intelligence
Gathering information from spies, informants, or specialists in a field, is which type of intel gathering?
HUMINT
GEOINT
IMINT
SIGINT
Analysis of Competing Hypotheses starts with a brainstorming session to identify:
A full set of alternative hypotheses
A hypothesis the analyst seeks to confirm
Evidence that would be consistent with a hypothesis
Two similar hypotheses and allow evidence to define which best
Error in thinking that occurs when people are processing and interpreting information in the world around them is known as:
Cognitive bias
Corrupt sourcing
Disinformation campaign
Illusory truth
With intelligence writing, all of the following describes characteristics conveying information in the conclusion EXCEPT:
Repetitive
Substantive
Proportional
Consistent
The tendency to rely too heavily on one trait or piece of information when making decisions, is known as:
Anchoring
Influenced
Distortion
Fixation
Estimative language is made up of two parts:
Confidence in assessment and likelihood of an event
Confidence in secondary concurrence and likelihood of acceptance
Likelihood of community acceptance and supporting statistics
Likelihood of event and ability to influence perception
Which of the following is a procedure or a method for the analysis of some problem, status, or fact?
Analytical method
Hypothetical method
Mental model
Predictive method
Which of the following is the process of conducting holistic analysis on threats and opportunities?
Strategic analysis
Situational analysis
Financial analysis
Exposure analysis
Which of the following models requires a close examination of relationships and their influence and is accomplished through the examination of phenomena as cause-and-effect patterns of behavior?
Systems Dynamics Modeling
Logical Fallacy Modeling
Contrarian Modeling
Predictive Modeling
Cyber intelligence acquires, processes, analyzes and disseminates information that:
Identifies, tracks and predicts threats, risks and opportunities inside the cyber domain
Eliminates threats and risks while enhancing opportunities inside the cyber domain
Segments threats, risks and opportunities inside the cyber domain for later analysis
Identifies the threats that could be avoided through placement of specific security devices
The reporting mechanism is only as effective as the feedback counterpart.
True
False
Any hypothesis that an analyst has accepted to be true and which forms the basis of an assessment is a:
Diagnostic assumption
Key assumption
Analytic method
Vetted assumption
Drawing different conclusions from the same information depending on how the information is presented, is known as:
Credulity effect
Distortion effect
Framing effect
Validity effect
All of the following are examples of Logical Fallacies EXCEPT:
Appeal to emotion
Hypotheticals
Middle ground
Slippery slope
Which of the following is a best practice for the start of a writing product when adhering to BLUF - Bottom Line Up Front - writing?
Do not exceed half page
Expand on information analyzed
Make it a summary of key points
Avoid recommendations or actionable items
Cyber intelligence includes cyber threat intelligence, but cyber threat intelligence does not represent all of cyber intelligence.
True
False
All of the following are examples of good cyber hygiene EXCEPT:
Patching systems
Vulnerability scanning
Enabling backdoors only for software engineers
Inventorying hardware and software assets
Red team analysis attempts to model the behavior of an individual or group by trying to replicate how an adversary would think about a particular issue.
True
False
What If Analysis is part of which analytic methodology?
Logical Fallacy
Structured Analytic Technique
Bandwagon Technique
Contrarian Technique
A cyber intelligence specialist gathering SIGINT would be interested in which of the following?
A new employee's personnel folder
A Flash drive
A cell-phone call
A commercial database
What is the rule of thumb ABCs for intelligence briefings?
Accountable, broad, clear
Accuracy, brevity, clarity
Author, benchmark, conclusion
Accuracy, boldly, certainty
The intelligence cycle has evolved to where the success and failure of one or more steps in the cycle does not impact any other part of the entire cycle.
True
False
With software creating so much data, what is the key for professionals in the cyber intelligence field?
Converting the generated data into manageable chunks for easier analysis
Supporting enough backups of the data so the data isn't lost or destroyed
Selecting appropriate tool to filter data out that doesn't support assumptions
Making sense of all the generated data in a timely, intelligent manner
Human analysts use their analytical ______ alongside the power and speed of ______ to produce timely, actionable, and accurate intelligence.
Software, threats
Data, trends
Acumen, machines
Software, machines
Which of the following terms is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network?
Network Governance
Network Infrastructure
Cyber Ecosystem
Cyber Intelligence
In intelligence writing, detailing threat and strategic analytical paragraphs should be in which voice?
Active
Passive
The following is an example of BLUF writing: This paper will look at the characteristics of insider threats. First, the study attempts to show influences behind the actions, and conclude with suggestions for preventing further compromises from this threat.
True
False
Self-driving cars, GPS networks, Apple watches, and satellites all have what in common?
Newer technologies invented within the past 5 years
Heavy reliance on software
Nearly impossible to exploit
Require VOIP communications
Intelligence is applying:
Knowledge to information
Science to data
Statistics to hypothesises
Finances to reporting
Which of the following is the first step in the intelligence cycle?
Planning and direction
Collection
Processing and exploitation
Analysis and production
The most probable hypothesis is the one with the least evidence against it, not the one with the most evidence for it.
True
False
Which structured analytic technique aims to make analytic arguments, assumptions, or intelligence gaps more transparent?
Aggregated
Contrarian
Diagnostic
Imaginative
{"name":"Cyber Intelligence", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Your Name, Gathering information from spies, informants, or specialists in a field, is which type of intel gathering?, Analysis of Competing Hypotheses starts with a brainstorming session to identify:","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Quizzes
How Well Do You Know Phoebe?
201024
520
CALIFICACIÓN DE LA CATEGORÍA MEJOR PROYECTO EMERGENTE 2016 - Parte 4
29140
Clomid/Serophene WORKSHEET
740
Interesting Facts about your immune system
17828
Mjiojiop
100
Which type of girl are you? (SORRY GIRLS ONLY)
630
Do you have any recommendations in new papers today?
100
English Placement Test 2021
106530
Découvrez votre Archétype Amoureux ® !
32160
Finished The Phrases how Jon would finish them
11611
STD V - Hindi (I)
1360