Lesson 2 - Threat Actors & Threat Intelligence Flashcards

1
Q

What is the difference between a vulnerability and a risk?

A

A vulnerability is a weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

A risk is the likelihood and impact of a threat actor exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Open Source Intelligence (OSINT)?

A

Using web search tools and social media to obtain information about the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security engineer is investigating a potential system breach. When compiling a report of the incident, how does the engineer classify the actor and the vector?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An unknowing user with authorized access to systems in a software development firm installs a seemingly harmless, yet unauthorized program on a workstation without the IT department’s sanction. Identify the type of threat that is a result of this user’s action.

A

Unintentional insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the acronym IoC stand for and what does it mean?

A

Indicator of Compromise. A residual sign that an asset or network has been successfully attacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hactivist?

A

An individual who attempts to obtain and release confidential information to the public domain, perform denial of service (DoS) attacks, or deface websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different hats that are used to find vulnerabilities and the authorization for each?

A

Black Hat - Unauthorized
White Hat - Authorized
Gray Hat - Semi-authorized; find vulnerabilities without seeking approval of the owner and will not try to exploit the vulnerabilities found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of TAXII?

A

Trusted Automated eXchange of Indicator Information. The protocol provides a means for transmitting CTI data between servers and clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the potential for someone or something to exploit a vulnerability and breach security?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All points at which a malicious threat actor could try to exploit a vulnerability.

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly