Question 10 of 10Pro Only

Discuss the challenges of adversary attribution in cyber threat intelligence. What techniques do analysts use to attribute attacks, what are the common obstacles including false flag operations, and how do geopolitical considerations influence both the production and consumption of threat intelligence?

Sample answer preview

Adversary attribution is one of the most challenging and consequential aspects of cyber threat intelligence. Correctly identifying who is behind an attack influences everything from incident response strategy to organizational risk decisions and, at the national level,…

attributionfalse flagOlympic DestroyerTTPsinfrastructure analysisgeopolitics

Unlock the full answer

Get the complete model answer, key points, common pitfalls, and access to 9+ more SOC Analyst interview questions.

Upgrade to Pro

Starting at $19/month • Cancel anytime