Threat Actors
Who's branch is it anyways
GIAC or GCTI questions
Anything CTI
Who the H*$% would know that?
100

What RaaS group that has been active since September 2019 and has ranked as the most prolific and destructive group, in the cybercriminal world of ransomware.

LockBit

100

Who eats crayons all members must be included (Answers have to be in the form of members who currently are in CTI) 

Garrett, Jermaine, Andrea, We will accept Tommy and Brian

100

What does GIAC stand for? 

Global Information Assurance Certification

100

Provide 3 search engine operators 

Quotations, filetype:, intitle:, And/Or, *, intext:, -

100

Who were the original CTI directors (Answer must be first and last names) 

Erica Braun, Calvin Bryant 

200

Russian cyberespionage group that has been linked to some of the most destructive incidents of the past decade, including the power outages in Ukraine in 2015 and 2016, the 2017 NotPetya supply chain attack?

Sandworm, Telebots, Electrum, Voodoo Bear, Iron Viking

200

Who is our solo dolo costie (Answers have to be in the form of members who currently are in CTI)

Nicholas 

200

How can intelligence from well-known cyber attacks be used to improve current cybersecurity practices? CHOOSE ALL THAT APPLY:
a) Developing new encryption standards
b) Understanding attacker tactics
c) Enhancing incident response plans
d) Designing user-friendly interfaces
e) Training staff on social engineering

B, C, E

200

How many entries does the first page of the Cyber Advisory have?

10

200

When Gabe joined CTI as an intern who was his team lead? 

Andrew 

300

Who is responsible for TeamPhisher vulnerability? We briefed this today who payed attention? 

Storm-0423, Sangria tempest 

300

What does ARMY stand for?  

A Recruiter Misled You

300

During the __________ phase of the Cyber Kill Chain, the adversary exploits a vulnerability to execute code on the victim’s system.

a) Reconnaissance
b) Exploitation
c) Delivery
d) Installation

Exploitation

300

Describe what is on both sides of a Threat card 

Answer pending 

300

Before the current team breakdown, internal and external used to be on a rotation for the collections schedule. How long was that rotation? 

2 weeks

400

What Russian-backed threat actor is most known for compromising the Hillary Clinton campaign, Democratic National Committee, and the Democratic Congressional Campaign Committee, all as part of an effort to compromise the U.S. presidential election?

Fancy Bear, APT28, Blue Delta

400

What does Navy stand for? 

Never again volunteer yourself 

400

Which of the following is an example of a logical fallacy that could hinder accurate analysis?

a) Hasty generalization
b) Data normalization
c) Algorithm bias
d) Redundancy elimination

Hasty generalization

400

Who was the last CTI member to receive a degree? 

Lydia

400

What colors hives no longer exist 

Orange, Yellow 

500

This financially motivated group targets retail, hospitality and entertainment industries. The group has previously conducted several spearphishing campaigns using the downloader PUNCHBUGGY and POS malware PUNCHTRACK.

FIN8, ATK113, G0061 

500

What popular pizza brand is based around WWI ace pilot? 

Red Baron Pizza or Manfred van something unpronounceable (Yeah hes german)

500

When analyzing intelligence, which cognitive bias involves favoring information that confirms preexisting beliefs or theories?

a) Availability bias
b) Confirmation bias
c) Anchoring bias
d) Hindsight bias

Confirmation bias

500

What # investigation report is CTI on for the year?

024-24

500

What country was CTIs HR rep visiting next 

Iceland 

M
e
n
u