Chapter 5 Threat and Vulnerability Management Mark B Flashcards
(32 cards)
Which of the following intelligence types focuses on the threat actor and the reason for the attack?
A. Tactical
B. Strategic
C. Targeted
D. Operational
A. Tactical
What is used as a common vector to launch a broad range of attacks?
A. Tactical
B. Strategic
C. Commodity Malware
D. Targeted attacks
C. Commodity Malware
What type of attack would use spear phishing against engineers in the Ukraine electricity supply industry with the goal of gaining user credentials?
A. Deep web
B. Proprietary
C. Commodity Malware
D. Targeted attacks
D. Targeted attacks
Which of the following intelligence types focuses on the technical and automated discovery of everyday threats, threat actors and the reason for the attack?
A. Tactical
B. Strategic
C. Commodity malware
D. Operational threat intelligence
A. Tactical
Which of the following intelligence types uses forensics and historical logs to identify threats?
A. Tactical
B. Strategic
C. Commodity malware
D. Operational threat intelligence
D. Operational threat intelligence
What framework could a forensic team use to document a specific adversary, victim, capabilities and infrastructure?
A. Threat emulation
B. Threat hunting
C. Diamond model
D. STIX
C. Diamond model
What is the most likely threat actor if your router firmware has been tampered with over a period of two years, without being detected?
A. Advanced persistent threat
B. Insider threat
C. Hacktivist
D. Script kiddie
A. Advanced persistent threat
What is the most likely threat actor if your electrical power delivery capabilities are attacked?
A. Nation State
B. Insider threat
C. Hacktivist
D. Script Kiddie
A. Nation State
What threat actor will most likely steal your intellectual property?
A. Advanced persistent threat
B. Competitor
C. Hacktivist
D. Script kiddie
B. Competitor
What is the threat when vulnerabilities are present on your network due to misconfiguration by poorly trained technicians?
A. Advanced persistent threat
B. Insider threat
C. Script kiddie
D. Organized Crime
B. Insider threat
What is the threat when vulnerabilities are present due to the use of third party libraries in our code base?
A. Advanced persistent threat
B. Supply Chain
C. Insider Threat
D. Organized Crime
B. Supply Chain
What is the likely threat actor when thousands of systems are targeted with crypto malware followed up with a demand for $5,000 in bitcoin?
A. Advanced persistent threat
B. Supply chain
C. Insider threat
D. Organized Crime
D. Organized Crime
What is the public network that hosts unindexed and unsearchable content that may be useful for unlawful activities?
A. World Wide Web
B. Intranet
C. Deep web
D. Proprietary networks
C. Deep web
What type of intelligence gathering would involve DNS record harrvesting?
A. Intelligence feeds
B. Deep Web
C. Open Source Intelligence
D. Human intelligence
C. Open Source Intelligence
What type of intelligence gathering would involve physical reconnaissance?
A. Intelligence feeds
B. Deep Web
C. Open Source Intelligence (OSINT)
D. Human intelligence (HUMINT)
D. Human intelligence (HUMINT)
What framework would be the best choice to build up a picture of threat actors and their tactics and techniques for a water treatment plan?
A. MITRE ATT&CK
B. ATT&CK for industrial analysis
C. Diamond model of intrusion analysis
D. Cyber kill chain
B. ATT&CK for industrial analysis
What framework would be used to understand the capabilities of APT29 and how they will target your enterprise information systems?
A. MITRE (ATT&CK)
B. ATT&CK for industrial control system (ICS)
C. Scripts/regular expressions
D. SRTM
A. MITRE (ATT&CK)
What framework uses seven stages, starting with reconnaissance and ending in actions on objectives?
A. MITRE (ATT&CK)
B. ATT&CK for industrial control system (ICS)
C. Diamond model of intrusion analysis
D. Cyber kill chain
D. Cyber kill chain
What file type allow for the analysis of network traffic captured by Wireshark or tcpdump?
A. Packet capture (PCAP)
B. Vulnerability logs
C. Operating system logs
D. Portable Data Format (PDF)
A. Packet capture (PCAP)
What can be used to centrally correlate events form multiple sources and raise alerts?
A. FIM Alerts
B. SIEM Alerts
C. DLP Alerts
D. IDS/IPS Alerts
B. SIEM Alerts
What type of logging can be used for accountability?
A. Vulnerability Logs
B. Operating system logs
C. Access Logs
D. NetFlow Logs
C. Access Logs
What type of logging can identify the source of most noise on a network?
A. Vulnerability logs
B. Operating system logs
C. Access Logs
D. NetFlow Logs
D. NetFlow Logs
How will you know if my critical files have been tampered with?
A. FIM Alerts
B. SIEM Alerts
C. DLP Alerts
D. IDS/IPS Alerts
A. FIM Alerts
George has tried to email his company credit card details to his Gmail account. The security team has contacted him and reminded him this is not acceptable use. How were they informed?
A. FIM alerts
B. SIEM Alerts
C. DLP alerts
D. IDS/IPS alerts
C. DLP alerts