Chapter 2: Threats, Attacks, and Vulnerabilities Flashcards

(37 cards)

1
Q

Question: Which threat actor is typically motivated by political or social causes, aiming to promote a message or protest?
A) Nation-State
B) Unskilled Attacker
C) Hacktivist
D) Organised Crime

A

Answer: C) Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question: True or False: “Script kiddies” are often referred to as unskilled attackers.

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question: Which attribute of threat actors refers to whether they originate from within or outside the organisation?
A) Resources/Funding
B) Level of Sophistication/Capability
C) Internal/External
D) Motivations

A

Answer: C) Internal/External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question: What is the primary motivation for “Organised Crime” threat actors?

A

Answer: Financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question: Which “threat” represents unauthorised applications, tools, or systems used within an organisation, not officially sanctioned by the IT department?
A) Insider Threat
B) Nation-State
C) Shadow IT
D) Unskilled Attacker

A

Answer: C) Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question: Which motivation involves spying on entities to gather sensitive information, commonly associated with Nation-States?
A) Data Exfiltration
B) Service Disruption
C) Espionage
D) Blackmail

A

Answer: C) Espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question: Which message-based threat vector involves mobile-based text messages that can contain phishing links?
A) Email
B) Instant Messaging (IM)
C) SMS (Smishing)
D) Voice Call (Vishing)

A

Answer: C) SMS (Smishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question: True or False: Malicious payloads can be embedded in images to exploit vulnerabilities when viewed.

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question: What type of software runs without installations or agents, making it harder to monitor and potentially vulnerable?
A) Client-based software
B) Agentless software
C) Supported software
D) Patched software

A

Answer: B) Agentless software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question: What is the security risk associated with “Unsupported Systems and Applications”?

A

Answer: They are outdated software that no longer receive security updates, making them a significant risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question: What is the vulnerability associated with “Default Credentials”?

A

Answer: Devices or systems with unchanged default passwords can be easily accessed by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question: Which supply chain threat vector, if compromised, can provide access to their client’s infrastructure?
A) Vendors
B) Suppliers
C) Managed Service Providers (MSPs)
D) Human Vectors

A

Answer: C) Managed Service Providers (MSPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question: What is “Pretexting” in the context of human vectors/social engineering?

A

Answer: Using fabricated scenarios to obtain personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question: Which social engineering technique involves compromising a commonly used website to target its visitors?
A) Phishing
B) Vishing
C) Watering Hole
D) Typosquatting

A

Answer: C) Watering Hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question: Which application vulnerability occurs when data exceeds the buffer’s capacity, leading to an overwrite of adjacent memory locations?
A) Memory Injection
B) Buffer Overflow
C) Race Conditions
D) Malicious Update

A

Answer: B) Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question: What is a “Race Condition” vulnerability?

A

Answer: Situations where a system’s behaviour depends on the sequence or timing of uncontrollable events.

17
Q

Question: Which web-based vulnerability involves attackers inserting malicious SQL code into input fields to run unauthorised SQL queries?
A) Cross-site Scripting (XSS)
B) Structured Query Language Injection (SQLi)
C) Memory Injection
D) Buffer Overflow

A

Answer: B) Structured Query Language Injection (SQLi)

18
Q

Question: True or False: Cross-site Scripting (XSS) involves attackers injecting malicious scripts into websites, which are then executed by the victim’s browser.

19
Q

Question: What is the security concern with “End-of-life Hardware”?

A

Answer: Devices no longer supported by manufacturers, resulting in unpatched vulnerabilities.

20
Q

Question: Which virtualisation vulnerability allows an attacker to run code on a VM and break out to interact with the host system?
A) Resource Reuse
B) Cloud-specific Vulnerabilities
C) Virtual Machine (VM) Escape
D) Misconfiguration

A

Answer: C) Virtual Machine (VM) Escape

21
Q

Question: What are “Zero-day Vulnerabilities”?

A

Answer: Previously unknown vulnerabilities that are not yet patched by vendors, meaning there is no defence against them until discovered.

22
Q

Question: What is “Jailbreaking” in the context of mobile device vulnerabilities?

A

Answer: Bypassing the built-in security mechanisms of iOS leaves the device vulnerable.

23
Q

Question: A sudden file encryption, a ransom note displayed, and a change of file extensions are strong indicators of which type of malware attack?
A) Trojan
B) Worm
C) Ransomware
D) Spyware

A

Answer: C) Ransomware

24
Q

Question: What is a key indicator of a “Worm” malware attack?

A

Answer: Rapid spread across networked devices and self-replicating behaviour.

25
Question: True or False: Unauthorised data transmission and pop-up ads are common indicators of Spyware.
Answer: True
26
Question: Visible damage to locks or entry points and unauthorised entry are indicators of what type of attack? A) Malware Attack B) Network Attack C) Physical Attack D) Application Attack
Answer: C) Physical Attack
27
Question: Large amounts of traffic from a multitude of sources is a general indicator of which network attack? A) DNS Attacks B) On-path (Man-in-the-Middle) C) Distributed Denial-of-Service (DDoS) D) Credential Replay
Answer: C) Distributed Denial-of-Service (DDoS)
28
Question: What is "Privilege Escalation" in application attacks?
Answer: Lower-level users gaining higher-level access.
29
Question: Which cryptographic attack involves two different data inputs producing the same output hash? A) Downgrade attack B) Collision attack C) Birthday attack D) Replay attack
Answer: B) Collision attack
30
Question: What does "Impossible Travel" indicate in general security indicators?
Answer: Logins from geographically distant locations in a short timeframe, suggesting suspicious activity.
31
Question: What is the purpose of "Segmentation" as a mitigation technique?
Answer: Dividing a network into smaller segments isolates data and services, preventing attackers from easily accessing other parts of the network if one is breached.
32
Question: True or False: An Access Control List (ACL) defines who can access a particular resource and what operations they can perform.
Answer: True
33
Question: What is the purpose of an "Application Allow List"?
Answer: To specify which applications are allowed to run on a system, preventing anything not on the list from executing and minimising the risk of malicious software.
34
Question: What is the purpose of "Patching" as a mitigation technique?
Answer: Regularly updating software and systems to fix known vulnerabilities, reducing the attack surface.
35
Question: Which security principle involves granting users only the permissions they need to perform their roles? A) Isolation B) Least Privilege C) Configuration Enforcement D) Decommissioning
Answer: B) Least Privilege
36
Question: What is the purpose of "Decommissioning" in security mitigation techniques?
Answer: Safely removing systems or software from operation to ensure old, potentially vulnerable software or hardware doesn't remain a weak point in the network.
37
Question: Which hardening technique controls incoming and outgoing network traffic at the machine level? A) Encryption B) Installation of Endpoint Protection C) Host-based Firewall D) Host-based Intrusion Prevention System (HIPS)
Answer: C) Host-based Firewall