Stufff Flashcards

(28 cards)

1
Q

Which framework includes Reconnaissance, Weaponization, and Delivery?

A

B) Cyber Kill Chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the goal of the Pyramid of Pain?

A

C) To hinder adversaries by targeting their TTPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the Traffic Light Protocol (TLP) define?

A

B) Sharing restrictions for sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is meant by ‘Defense Evasion’ in a cyberattack?

A

B) Avoiding detection by security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which tool allows threat intelligence sharing in a structured and automated manner?

A

A) STIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which term refers to a cyber threat intelligence sharing initiative?

A

B) CIISI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ‘Reconnaissance’ in the Cyber Kill Chain refer to?

A

B) Identifying vulnerabilities in a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary motivation for Nation-State threat actors?

A

C) Political objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does ‘Privilege Escalation’ involve?

A

B) Gaining unauthorized access to higher-level permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term ‘MLCOA’ stand for in threat scenario planning?

A

A) Most Likely Course of Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Horizon Scanning, how far into the future should you look?

A

B) 5-10 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the ‘Murder Board’ technique?

A

B) To aggressively review assumptions and solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is NOT part of the Threat Intelligence Lifecycle?

A

C) Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does F3EAD stand for in intelligence operations?

A

A) Find, Fix, Finish, Exploit, Analyze, Disseminate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a significant characteristic of Nation-State attackers?

A

B) They target their own citizens and foreign entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the term ‘Horizon Scanning’ involve?

A

B) Looking into the future to assess potential threats

17
Q

Which document describes metrics for security incident reporting?

18
Q

What is the role of TAXII in threat intelligence?

A

C) Sharing threat information between organizations

19
Q

What does STIX stand for?

A

A) Standardized Threat Indicator and Exchange

20
Q

Which is an example of a Machine-Readable Threat Intelligence (MRTI) format?

A

A) CybOX

C) VERIS

21
Q

What does STIX stand for?

A

B) Structured Threat Information eXpression

22
Q

What is the Pyramid of Pain designed to do?

A

C) Rank the difficulty in disrupting adversary operations

23
Q

What is ‘Insider Threat - Unintentional’ categorized as?

A

B) An unwitting employee clicking a malicious link

24
Q

What is the role of ‘Credential Access’ in the Cyber Kill Chain?

A

B) Gaining unauthorized access to usernames and passwords

25
What is MISP, developed by NATO, used for?
C) Tracking and analyzing rare malware
26
What is the goal of Intelligence Preparation of the Cyber Environment (IPCE)?
B) To understand the threat landscape and potential scenarios
27
What is the focus of Intelligence Preparation of the Battlefield (IPB)?
C) Defining and analyzing the cyber battlefield environment
28
What does the term 'Exfiltration' refer to in a cyberattack?
C) Transferring stolen data out of the network