Outsmarting Threat Actors Flashcards

(11 cards)

1
Q

What are tactics, Techniques, and Procedures (TTPs)?

A

Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Deceptive and Disruption Technologies?

A

Technologies designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Honeypots?

A

Decoy system or network set up to attract potential hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Honeynets?

A

Network of honeypots to create a more complex system that is designed to mimic an entire network of systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Honey files?

A

Decoy file placed within a system to lure in potential attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Honeytokens?

A

Piece of data or are source that has no legitimate value or use, but is monitored for access or use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Bogus DNS entries?

A

Fake Domain Name System entries introduced into your system’s DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Decoy directories?

A

Fake folders and files placed within a system’s storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Dynamic page generation?

A

Effective against automated scraping tools or bots trying to index or steal content from your organization’s website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Port triggering?

A

Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What occurs in a Spoofing fake telemetry data?

A

When a system detects a network scan is being attempted by an attacker, it can be configured to respond by sending out fake telemetry or network data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly