Chapter 2: Threats, Attacks, and Vulnerabilities Flashcards
(37 cards)
Question: Which threat actor is typically motivated by political or social causes, aiming to promote a message or protest?
A) Nation-State
B) Unskilled Attacker
C) Hacktivist
D) Organised Crime
Answer: C) Hacktivist
Question: True or False: “Script kiddies” are often referred to as unskilled attackers.
Answer: True
Question: Which attribute of threat actors refers to whether they originate from within or outside the organisation?
A) Resources/Funding
B) Level of Sophistication/Capability
C) Internal/External
D) Motivations
Answer: C) Internal/External
Question: What is the primary motivation for “Organised Crime” threat actors?
Answer: Financial gain.
Question: Which “threat” represents unauthorised applications, tools, or systems used within an organisation, not officially sanctioned by the IT department?
A) Insider Threat
B) Nation-State
C) Shadow IT
D) Unskilled Attacker
Answer: C) Shadow IT
Question: Which motivation involves spying on entities to gather sensitive information, commonly associated with Nation-States?
A) Data Exfiltration
B) Service Disruption
C) Espionage
D) Blackmail
Answer: C) Espionage
Question: Which message-based threat vector involves mobile-based text messages that can contain phishing links?
A) Email
B) Instant Messaging (IM)
C) SMS (Smishing)
D) Voice Call (Vishing)
Answer: C) SMS (Smishing)
Question: True or False: Malicious payloads can be embedded in images to exploit vulnerabilities when viewed.
Answer: True
Question: What type of software runs without installations or agents, making it harder to monitor and potentially vulnerable?
A) Client-based software
B) Agentless software
C) Supported software
D) Patched software
Answer: B) Agentless software
Question: What is the security risk associated with “Unsupported Systems and Applications”?
Answer: They are outdated software that no longer receive security updates, making them a significant risk.
Question: What is the vulnerability associated with “Default Credentials”?
Answer: Devices or systems with unchanged default passwords can be easily accessed by attackers.
Question: Which supply chain threat vector, if compromised, can provide access to their client’s infrastructure?
A) Vendors
B) Suppliers
C) Managed Service Providers (MSPs)
D) Human Vectors
Answer: C) Managed Service Providers (MSPs)
Question: What is “Pretexting” in the context of human vectors/social engineering?
Answer: Using fabricated scenarios to obtain personal data.
Question: Which social engineering technique involves compromising a commonly used website to target its visitors?
A) Phishing
B) Vishing
C) Watering Hole
D) Typosquatting
Answer: C) Watering Hole
Question: Which application vulnerability occurs when data exceeds the buffer’s capacity, leading to an overwrite of adjacent memory locations?
A) Memory Injection
B) Buffer Overflow
C) Race Conditions
D) Malicious Update
Answer: B) Buffer Overflow
Question: What is a “Race Condition” vulnerability?
Answer: Situations where a system’s behaviour depends on the sequence or timing of uncontrollable events.
Question: Which web-based vulnerability involves attackers inserting malicious SQL code into input fields to run unauthorised SQL queries?
A) Cross-site Scripting (XSS)
B) Structured Query Language Injection (SQLi)
C) Memory Injection
D) Buffer Overflow
Answer: B) Structured Query Language Injection (SQLi)
Question: True or False: Cross-site Scripting (XSS) involves attackers injecting malicious scripts into websites, which are then executed by the victim’s browser.
Answer: True
Question: What is the security concern with “End-of-life Hardware”?
Answer: Devices no longer supported by manufacturers, resulting in unpatched vulnerabilities.
Question: Which virtualisation vulnerability allows an attacker to run code on a VM and break out to interact with the host system?
A) Resource Reuse
B) Cloud-specific Vulnerabilities
C) Virtual Machine (VM) Escape
D) Misconfiguration
Answer: C) Virtual Machine (VM) Escape
Question: What are “Zero-day Vulnerabilities”?
Answer: Previously unknown vulnerabilities that are not yet patched by vendors, meaning there is no defence against them until discovered.
Question: What is “Jailbreaking” in the context of mobile device vulnerabilities?
Answer: Bypassing the built-in security mechanisms of iOS leaves the device vulnerable.
Question: A sudden file encryption, a ransom note displayed, and a change of file extensions are strong indicators of which type of malware attack?
A) Trojan
B) Worm
C) Ransomware
D) Spyware
Answer: C) Ransomware
Question: What is a key indicator of a “Worm” malware attack?
Answer: Rapid spread across networked devices and self-replicating behaviour.