Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- MITRE's ATT&CK Navigator allows you to research what?
a. File hashes
b. IP addresses
c. Tactics, techniques, and sub-techniques
d. Domains
- A command-line tool used to interact with APIs is called what?
a. cURL
b. Vi
c. Nano
d. Chrome
- What allows you to authenticate to IPinfo's API?
a. Key
b. Username and password
c. Cookie
d. Token
- Currently, you can perform enrichments from within an Elastic timeline for which indicator types?
a. Domains
b. IP addresses
c. Registry keys
d. File hashes
- When uploading a file to VirusTotal, what is a risk?
a. The adversary could know they've been detected.
b. You could infect yourself.
c. The results may not be accurate.
d. You cannot upload malware to VirusTotal.