Vulnerabilities, Exploits, and Threat Actors Flashcards

Vulnerabilities, Exploits, and Threat Actors (30 cards)

1
Q

What is a vulnerability in cybersecurity?

A

A weakness in a system, software, or configuration that can be exploited by a threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an exploit?

A

A piece of code or method used to take advantage of a vulnerability to gain unauthorized access or control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CVE?

A

Common Vulnerabilities and Exposures, a publicly disclosed list of known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CVSS?

A

Common Vulnerability Scoring System, used to rate the severity of vulnerabilities on a scale from 0 to 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a zero-day vulnerability?

A

A vulnerability unknown to the vendor and the public, often exploited before a patch is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is privilege escalation?

A

Exploiting a flaw to gain higher access permissions than originally granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is buffer overflow?

A

An exploit that overwrites memory beyond buffer limits, potentially allowing code execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is remote code execution (RCE)?

A

An exploit that allows attackers to execute code on a remote system without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SQL injection?

A

A vulnerability that allows an attacker to manipulate SQL queries to access or modify data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cross-site scripting (XSS)?

A

An exploit where attackers inject malicious scripts into web pages viewed by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is command injection?

A

Exploiting a system to execute arbitrary OS-level commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a security patch?

A

To fix known vulnerabilities and prevent exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an exploit kit?

A

A toolset used by attackers to deliver exploits targeting common vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is vulnerability chaining?

A

Using multiple vulnerabilities together to achieve greater access or impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Proof of Concept (PoC) in exploit development?

A

A demonstrative code or method showing how a vulnerability can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who are threat actors in cybersecurity?

A

Individuals or groups that pose a threat by performing or facilitating cyberattacks.

17
Q

What are nation-state actors?

A

Government-sponsored threat actors engaging in espionage or sabotage.

18
Q

What are script kiddies?

A

Inexperienced attackers who use pre-made tools or scripts to perform basic attacks.

19
Q

What is an insider threat?

A

A threat originating from within an organization, such as an employee or contractor.

20
Q

What are hacktivists?

A

Threat actors motivated by political or social agendas.

21
Q

What is a cybercriminal group?

A

Organized groups aiming for financial gain through cyberattacks.

22
Q

What is an Advanced Persistent Threat (APT)?

A

A prolonged, targeted attack by skilled threat actors, often state-sponsored.

23
Q

What is a TTP in relation to threat actors?

A

Tactics, Techniques, and Procedures used by attackers.

24
Q

What is threat attribution?

A

Identifying the responsible party behind an attack, often using intelligence and forensic data.

25
What is threat intelligence?
Data collected and analyzed to understand current and emerging threats.
26
What tool helps prioritize vulnerability remediation?
Vulnerability Management System (e.g., Qualys, Tenable, Nexpose).
27
What is the difference between a vulnerability and a misconfiguration?
A vulnerability is a software flaw; a misconfiguration is an insecure setting or implementation.
28
How can SOC teams detect exploit attempts?
Using IDS/IPS, EDR, and correlating logs in a SIEM system.
29
What does "exploit in the wild" mean?
A vulnerability that is actively being exploited in real-world attacks.
30
What is the role of a CVE scanner in a SOC?
To identify and report systems vulnerable to known exploits for patching.