Threats & Vulnerabilities Flashcards
(7 cards)
1
Q
What is a zero-day attack?
A
An exploit unknown to the vendor
2
Q
What is the MITRE ATT&CK framework?
A
A database of adversary tactics, techniques, and procedures
3
Q
What is vulnerability scanning and how is it done?
A
Automated scan to detect system weaknesses
4
Q
A user receives an email that appears to be from IT asking for their login credentials. What kind of attack is this?
A
Phishing
5
Q
A vulnerability was exploited before a patch was available. What is this called?
A
Zero-Day Attack
6
Q
What is the purpose of MITRE ATT&CK?
A
To catalog and analyze attacker tactics and techniques
7
Q
What is an advantage of performing a vulnerability scan?
A
Identify known weaknesses without exploiting them