Key Concepts Flashcards

(40 cards)

1
Q

What is the key characteristic of CBEST that differentiates it from other security testing regimes?
a) Automated scanning
b) Intelligence-led approach
c) Randomized testing
d) Employee training

A

b) Intelligence-led approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the focus of CBEST’s penetration testing approach?
a) Testing user passwords
b) Mimicking cyber attackers to compromise important business services
c) Simulating phishing attacks
d) Enhancing website traffic

A

b) Mimicking cyber attackers to compromise important business services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of threat actor lacks technical skills but uses scripts from others?

A

b) Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary motive of hacktivists?

A

c) Political agenda

Answer: c) Political agenda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which threat actor is known for using cyberspace to disrupt, gain profits, or spread propaganda?

A

a) Cyber terrorists

Answer: a) Cyber terrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do cyber criminals typically target for financial gain?

A

a) Personal identifiable information

Answer: a) Personal identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of threat actor is affiliated with a nation state?

A

d) State-sponsored groups

Answer: d) State-sponsored groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Cyber Killchain framework help with?
a) Identifying physical threats
b) Intrusion analysis
c) Employee training
d) Hardware security

A

b) Intrusion analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Diamond Model of intrusion is used for:

A

b) Intrusion analysis

Answer: b) Intrusion analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does ACH stand for?

A

Analysis of competing hypothesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of the Intelligence Preparation of the Environment (IPE)?

A

b) Understanding likely threat scenarios

Answer: b) Understanding likely threat scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a key step in the IPE process?

A

c) Evaluating threats

Answer: c) Evaluating threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is NOT a step in the IPE process?

A

c) Develop malware

Answer: c) Develop malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the MoSCoW prioritization framework help with?

A

b) Task prioritization

Answer: b) Task prioritization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In an Intelligence Collection Plan (ICP), what is the role of ‘assets, resources, and deterrents’?

A

c) To evaluate and guide collection sources

Answer: c) To evaluate and guide collection sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of taskings in the Intelligence Collection Plan?

A

b) To assign collection tasks

Answer: b) To assign collection tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does a 5x5x5 grid help evaluate?

A

a) Data reliability and credibility

Answer: a) Data reliability and credibility

18
Q

Attack trees are used in threat modeling to:

A

d) Visualize attack paths

Answer: d) Visualize attack paths

19
Q

What format does STIX use for structured threat information expression?

A

c) JSON

Answer: c) JSON

20
Q

Which of the following is NOT an example of an STIX Domain Object (SDO)?

A

c) Relationship

Answer: c) Relationship

21
Q

What is the function of TAXII in threat intelligence sharing?

A

Answer: Incomplete question

22
Q

IX use for structured threat information expression?

A

c) JSON

Answer: c) JSON

23
Q

What is the function of TAXII in threat intelligence sharing?

A

c) Information exchange over HTTPS

Answer: c) Information exchange over HTTPS

24
Q

Which TLP color restricts disclosure to participants only?

A

d) TLP:RED

Answer: d) TLP:RED

25
What does TLP:WHITE indicate in information sharing?
c) Disclosure is not limited ## Footnote Answer: c) Disclosure is not limited
26
Which act makes it illegal to access a computer without permission?
b) Computer Misuse Act ## Footnote Answer: b) Computer Misuse Act
27
The Human Rights Act 1998 is based on:
b) European Convention on Human Rights ## Footnote Answer: b) European Convention on Human Rights
28
The Data Protection Act 1998 was designed to protect:
b) Personal data privacy ## Footnote Answer: b) Personal data privacy
29
Which act gives the Home Office greater control over operational policing?
c) Police and Justice Act ## Footnote Answer: c) Police and Justice Act
30
The Regulation of Investigatory Powers Act 2000 governs:
b) Covert surveillance and communication interception ## Footnote Answer: b) Covert surveillance and communication interception
31
What does the Proceeds of Crime Act allow the state to confiscate?
b) Proceeds obtained through unlawful conduct ## Footnote Answer: b) Proceeds obtained through unlawful conduct
32
What methodology uses Attack trees for threat modeling?
a) Cyber Killchain ## Footnote Answer: a) Cyber Killchain
33
Which threat actor primarily engages in ransomware attacks?
c) Cyber criminals ## Footnote Answer: c) Cyber criminals
34
Which process allows systematic analysis of mission variables like enemy, area, and weather?
b) IPB/IPE ## Footnote Answer: b) IPB/IPE
35
The 5x5x5 grid assesses:
c) Source reliability and information credibility ## Footnote Answer: c) Source reliability and information credibility
36
Which of the following is NOT a feature of the Diamond Model of Intrusion?
a) Attack phases ## Footnote Answer: a) Attack phases
37
The Computer Misuse Act prohibits:
b) Unauthorized access to computer material ## Footnote Answer: b) Unauthorized access to computer material
38
The CybOX standard is used to express:
b) Cyber observables and indicators ## Footnote Answer: b) Cyber observables and indicators
39
Which act makes it illegal for a commercial entity to fail to prevent bribery?
a) Bribery Act ## Footnote Answer: a) Bribery Act
40
What type of regulations are covered under the Bribery Act?
Telecommunications Regulations ## Footnote Answer: Bribery Act