6 Flashcards
Which of the following answers does not refer to an email communication threat vector?
Skimming
Which of the following mitigates the risk of supply chain attacks?
Vendor/Intermediary checks
Examples of social media threat vectors include:
- PII harvesting
- Social engineering
- Identity/account theft
- Malicious URLs
** All of the above **
Which of the following terms refers to threat intelligence gathered from publicly available sources?
** OSINT **
(Open Source Intelligence (OSINT) is the collection, analysis, and dissemination of information that is publicly available and legally accessible. Right now, OSINT is used by a organizations, including governments, businesses, and non-governmental organizations)
Which of the following answers refer to vulnerability databases?
- CVE (Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed vulnerabilities and exposures that is maintained by MITRE.)
- NVD (The National Vulnerability Database (NVD) is a database, maintained by NIST, that is fully synchronized with the MITRE CVE list)
Which of the following statements does not apply to dark web?
Forms a large part of the deep web
A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities is called:
** IoC **
During a cybersecurity incident, indicators of compromise (IoC) are clues and evidence of a data breach.
Which of the following terms refers to a US government initiative for real-time sharing of cyber threat indicators?
** AIS **
(Automated Indicator Sharing (AIS) is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enablereal-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations.)
What is STIX?
Common language for describing cyber threat information
STIX (Structured Threat Information eXpression) is a standardized XML programming language for conveying data about cybersecurity threats in a common language that can be easily understood by humans and security technologies.
Which of the following terms refers to a dedicated transport mechanism for cyber threat information?
TAXII
TAXII, short for Trusted Automated eXchange of Intelligence Information, defines how cyber threat information can be shared via services and message exchanges
GitHub is an example of:
File/code repository
A type of formal document that describes the specifications for a particular technology is known as:
RFC
A Request for Comments (rfc) is a publication in a series from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force
Which of the following describes the behavior of a threat actor?
TTPs
(Tactics, Techniques, and Procedures)
A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:
Zero-day attack
Which of the following answers refers to a deprecated encryption protocol?
** SSL **
The deprecated encryption protocol among the options you provided is SSL (Secure Sockets Layer). SSL has been largely replaced by its successor, TLS (Transport Layer Security), due to vulnerabilities and security issues found in SSL. TLS is a more secure and up-to-date protocol for securing data transmission over the internet.
It is essential to use TLS instead of SSL to ensure the security and privacy of data in transit.