You are on page 1of 3

6/11/2020 Learning Activity

(/s/) Productos y serv

Buscar... RAFAEL STEVEN SOT…


(/s/)

039.02 - Exam: Kaspersky Threat Intelligence [e] > Threat Data Tiempo restante: 00:10:57
Feeds

Progreso 4 / 20 20%

5. ABC Inc. su ered losses because of a malicious application installed on employees’ smartphones, which sent SMS messages
to premium rate numbers. Which Threat Data Feeds can help to detect this application?

Botnet C&C feeds

Malicious mobile hash feeds

P-SMS Trojan feeds

Malicious hash feeds

6. Which security risks do Threat Data Feeds help to mitigate? El número máximo de respuestas ha sido seleccionado

Local privilege escalation

Guest notebooks that do not meet the internal security policy

Bring Your Own Device

A server without antivirus protection

Lateral movement

7. Which data are used together with SIEM systems to detect an attack?

Antivirus signatures

Snort signatures

IoC

Yara rules

8. Which of the following le categories CANNOT be included in Whitelisting Threat Data Feeds?

Files of unde ned status

All of the above groups may get in the feeds

Potentially dangerous (Riskware)

Malicious les

Clean les

https://partners.kaspersky.com/s/learning-activity-detail-standard?ltui__urlRecordId=a425J0000004cWaQAI&ltui__urlRedirect=learning-activity-detail-s… 1/3
6/11/2020 Learning Activity
9. What is Yara?

A utility that helps to identify and classify malicious code

A utility that scans for rootkits

A vulnerability scanner

IoC converter

10. Which category do APT Reports pertain to in the Adaptive Security model?

Detect

Respond

Predict

Prevent

11. You aim to reduce the load on the mail gateway and improve anti-spam protection. How can Threat Data Feeds help you?

You can make the mail gateway block addresses that pertain to the spam category and have rating 75 or more according to IP Reputation feeds

You can make the mail gateway block addresses that pertain to the spam category according to IP Reputation feeds

You can make the mail gateway block any addresses that have rating 75 or more according to IP Reputation feeds

You can make the mail gateway block spamming IP addresses listed in the feeds

12. Which category do Threat Data Feeds pertain to in the Adaptive Security model?

Prevent

Respond

Detect

Predict

13. Which Threat Data Feeds can help to check whether some inbound connections are established from a Tor network?
You are investigating an incident related to theft of con dential information from an organization’s web servers. There is a suspicion that
the C&C channel uses Tor. 

IP reputation

Tor exit nodes

Data feeds do not provide this information

Botnet C&C

Cancelar Restablecer Anterior Siguiente Enviar

https://partners.kaspersky.com/s/learning-activity-detail-standard?ltui__urlRecordId=a425J0000004cWaQAI&ltui__urlRedirect=learning-activity-detail-s… 2/3
6/11/2020 Learning Activity

Política de privacidad (https://latam.kaspersky.com/web-privacy-policy) Noticias (/s/all-news)


Soporte técnico (/s/contacts?tabset-1c028=a5a48) Contactos (/s/contacts)

© 2020 AO Kaspersky. All Rights Reserved

(h
tt
ps
(h ://
tt w
(h ps w
tt :// w.l
ps w in
:// w ke
w w. di
w yo n. (h
w. ut c tt
fa u o ps
c b m ://
e e. /c t
b c o wi
o o m tt
ok m p er.
.c /u an c
o se y/ o
m r/ ka m
/K K sp /k
as as er as
p p sk p
er er y- er
sk sk la sk
y) y) b) y)

https://partners.kaspersky.com/s/learning-activity-detail-standard?ltui__urlRecordId=a425J0000004cWaQAI&ltui__urlRedirect=learning-activity-detail-s… 3/3

You might also like