Chapter 2 Flashcards

(13 cards)

1
Q

What are the common types of threat actors?

A

Nation-state, Unskilled attacker, Hacktivist, Insider threat, Organized crime, Shadow IT

Each type of actor has different motivations and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What attributes are used to classify threat actors?

A

Internal/external, Resources/funding, Level of sophistication/capability

These attributes help in understanding their potential impact and methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some motivations of threat actors?

A

Data exfiltration, Espionage, Service disruption, Blackmail, Financial gain, Philosophical/political beliefs, Ethical, Revenge, Disruption/chaos, War

Understanding motivations can aid in predicting and preventing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are common threat vectors?

A

Message-based, Image-based, File-based, Voice call, Removable device, Vulnerable software, Unsupported systems and applications, Unsecure networks, Open service ports, Default credentials, Supply chain

Each vector presents unique challenges for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blank: A common threat vector that involves emails and SMS is called _______.

A

Message-based

Message-based attacks exploit human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of networks are considered insecure?

A

Wireless, Wired, Bluetooth

Insecure networks can be easily exploited by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a common vulnerability related to software?

A

Unsupported systems and applications

These systems may not receive security updates, making them easier targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Default credentials can be a common attack surface.

A

True

Many systems are left with default credentials, making them vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the significance of supply chain vulnerabilities?

A

Managed service providers (MSPs), Vendors, Suppliers

Compromise at any level can affect the entire supply chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Domain 4.0: Security Operations

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

• Identification methods (Threat feed

A

Open-sourc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

intelligence (OSINT)

A

Proprietary/third-party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information-sharing organization

A

Dark web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly