Stufff Flashcards
(28 cards)
Which framework includes Reconnaissance, Weaponization, and Delivery?
B) Cyber Kill Chain
What is the goal of the Pyramid of Pain?
C) To hinder adversaries by targeting their TTPs
What does the Traffic Light Protocol (TLP) define?
B) Sharing restrictions for sensitive information
What is meant by ‘Defense Evasion’ in a cyberattack?
B) Avoiding detection by security systems
Which tool allows threat intelligence sharing in a structured and automated manner?
A) STIX
Which term refers to a cyber threat intelligence sharing initiative?
B) CIISI
What does ‘Reconnaissance’ in the Cyber Kill Chain refer to?
B) Identifying vulnerabilities in a target
What is the primary motivation for Nation-State threat actors?
C) Political objectives
What does ‘Privilege Escalation’ involve?
B) Gaining unauthorized access to higher-level permissions
What does the term ‘MLCOA’ stand for in threat scenario planning?
A) Most Likely Course of Action
In Horizon Scanning, how far into the future should you look?
B) 5-10 years
What is the purpose of the ‘Murder Board’ technique?
B) To aggressively review assumptions and solutions
Which is NOT part of the Threat Intelligence Lifecycle?
C) Response
What does F3EAD stand for in intelligence operations?
A) Find, Fix, Finish, Exploit, Analyze, Disseminate
What is a significant characteristic of Nation-State attackers?
B) They target their own citizens and foreign entities
What does the term ‘Horizon Scanning’ involve?
B) Looking into the future to assess potential threats
Which document describes metrics for security incident reporting?
C) VERIS
What is the role of TAXII in threat intelligence?
C) Sharing threat information between organizations
What does STIX stand for?
A) Standardized Threat Indicator and Exchange
Which is an example of a Machine-Readable Threat Intelligence (MRTI) format?
A) CybOX
C) VERIS
What does STIX stand for?
B) Structured Threat Information eXpression
What is the Pyramid of Pain designed to do?
C) Rank the difficulty in disrupting adversary operations
What is ‘Insider Threat - Unintentional’ categorized as?
B) An unwitting employee clicking a malicious link
What is the role of ‘Credential Access’ in the Cyber Kill Chain?
B) Gaining unauthorized access to usernames and passwords