Stuff Flashcards

(19 cards)

1
Q

What does CTI stand for?

A

B) Cyber Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which entity conducts Threat Intelligence-Based Ethical Red Teaming (TIBER)?

A

C) TIBER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Script Kiddie?

A

B) An individual using pre-made scripts to launch attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does IDS stand for?

A

B) Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary motivation for Hacktivists?

A

B) Political or social change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between IDS and IPS?

A

B) IDS detects malicious activity, IPS blocks it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack does a DDoS refer to?

A

B) Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an APT?

A

B) Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main goal of Ransomware gangs?

A

C) Financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Cyber Kill Chain?

A

C) A model to understand the steps of a cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these is NOT part of the Cyber Kill Chain?

A

C) Financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does TTP stand for?

A

B) Techniques Tactics and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of threat intelligence?

A

A) To predict, prevent, detect, and respond to threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does IoC stand for?

A

B) Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ‘Backcasting’ used for?

A

C) Working backward from a scenario to determine the cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does SIEM stand for?

A

A) Security Information and Event Management

17
Q

What are the four primary steps in the Cyber Kill Chain?

A

A) Reconnaissance, Weaponization, Delivery, and Action

18
Q

What does CBEST focus on?

A

B) Intelligence-led security testing for financial institutions

19
Q

What is the role of attribution in threat intelligence?

A

A) Identifying the source of attacks