Questions
How does comptia define threat actors? What are the different threat actor types? Why do we categorize threat actors into types? What are the different cybersecurity threat classifications? How are the hackers hats truly defined? What are the legal and ethical implications of each? Explain the different threat actor motivations. What are threat vectors and attack surfaces? How are the different threat vectors exploitable? What increases or decreases attack surfaces? What are the different activities to manage vulnerabilities? What are the components of threat data and intelligence systems? How does vulnerability management help deal with risks? How is shadow IT defined? What are the different threat vectors? And what are the means for using those vectors? What are the different attack surfaces, how do they relate to threat vectors? Define threat intelligence What are the different sources for threat intelligence? Explain each What is the purpose of threat intelligence? What is a vulnerability database, and why is it essential for threat intelligence programs? Why are indicators of compromise IoC important for threat intelligence? What are the different types of OSINT data sources? What are the different types of closed source intelligence? What are the factors that need to be considered when assessing threat intelligence? How should threat indicator management be conducted? What are standardized security languages for threat indicator management? What is OASIS? What are ISACS?