701 - Chapter 6 Flashcards

1
Q

What is a threat actor?

A

Anyone who launches a cyber attack on others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are attackers who are directly employed by or sponsored by a government called?

A

Nation state attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is a threat actor type that is motivated by money?

A

Organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an organized and sophisticated group of threat actors called?

A

In advanced persistent threat APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This attacker uses existing computer scripts or code to launch attacks, they typically have very little expertise or sophistication and very little funding?

A

Unskilled attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This attacker launches attacks as part of an activist movement or to further cause and raise awareness for that cause?

A

Hactivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This attacker has legitimate access to an organizations, internal resources, such as an employee of a company? What tool would be useful in combining an insider threat?

A

Insider threat… DLP tools by preventing these attackers from writing data to external media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three attacker attributes?

A

Internal versus external… resources and funding… level of sophistication and capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the ten threat actor motivations?

A

DATA exfiltration, disruption and chaos, financial gain, blackmail, service disruption, philosophical or political beliefs, ethical, revenge, espionage, war

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the paths that attackers use to gain access to computers and networks called?

A

Threat vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This threat vector is frequently sent out as spam with malicious links or attachments?

A

Message based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This threat vector occurs by embedding, malicious code within image files or using Steganography to hide data within an image?

A

Image based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This threat vector involves malicious code hidden in Files such as documents or spreadsheets?

A

File based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This threat vector includes phone based social engineering attacks where attackers impersonate trusted individuals or organizations into revealing sensitive information or granting access to secure systems?

A

Voice call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This threat vector occurs when an attacker loads a virus or malware on an external device?

A

Removable device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This threat vector targets vulnerabilities in software applications? What types of these are especially vulnerable?

A

Software based… unsupported applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This threat vector targets vulnerabilities in computer systems, such as operating systems, vulnerable applications, hardware issues, open service, ports, or default credentials?

A

System-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This threat vector exploits weaknesses Through unsecured wired or wireless networks or vulnerable Bluetooth connections or even eavesdropping on traffic?

A

Network based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This threat vector targets the relationships between organizations and their managed service providers, vendors or suppliers?

A

Supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the term for all of the threat vectors that an organization is exposed to other words all the way that attacker might come after them?

A

The attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What refers to any unauthorized system or application within an organization, including cloud services? And why does this increase risk for an organization?

A

Shadow IT… because these systems aren’t always well managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the term for a wide range of software that has malicious intent called?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some symptoms that your system is infected with malware?

A

It is running slower, starting unknown processes, sending out email without user action, rebooting randomly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or false virus and malware are the same thing?

A

False a virus is a specific type of malware, and there are many other types of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This malware type is malicious code that attaches itself to a host application and executes when the host application executes?

A

A virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This malware type is self replicating and travels through a network without assistance of a host application or user interaction? What is one of the significant problems caused by this malware type?

A

A worm… they consume network bandwidth which can negatively impact the performance of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This malware type is a string of code embedded into an application or script that will execute in response to an event or date and time?

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The malware type appears is something beneficial, but actually it’s something malicious? What are the typical ways that this malware gets onto a system?

A

A Trojan horse… drive-by downloads, fake antivirus software, pirated software, browser extensions

29
Q

This is a type of malware that allows attackers to control systems from remote locations and is often delivered via drive-by, downloads or malicious attachments and emails?

A

A remote access Trojan RAT

30
Q

This type of malware will capture a users key strokes? What is one method that can stop it?

A

Key loggers… two factor authentication

31
Q

This type of malware is installed on user systems without their awareness or consent , and it’s purpose is often to monitor the users, computer and their activity?

A

Spyware

32
Q

This type of malware gains administrative access on the system to provide the attacker with admin privileges, and can be difficult to find because it hides its running processes to avoid detection?

A

Rootkit

33
Q

What makes root kits so dangerous?

A

They have system level or kernel access and can modify system files and system access

34
Q

With a root kit, what technique is used to intercept calls to the operating system, It’s events or messages, and uses these to control the systems behavior?

A

Hooking

35
Q

What kind of tool can help find a rootkits hidden hooked processes?

A

Tools that can inspect RAM

36
Q

This is a type of malware that allows the attacker to take control of a computer and data, locking out its users until the user pays the fee to unlock it? More and more, attackers are increasingly targeting who with this?

A

Ransomware… hospitals, cities, and other large organizations

37
Q

This type of malware describes programs a user may not want even if they consented to downloading them?

A

Bloatware

38
Q

What are five potential indicators of a malware attack?

A

Extra traffic, #DATA exfiltration, encrypted traffic, traffic to specific IPs, outgoing spam

39
Q

What is the practice of using social tactics to gain information called?

A

Social engineering

40
Q

What are the four ways that social engineering attacks can occur?

A

In person, over the phone, while surfing the Internet, via email

41
Q

What can help prevent shoulder surfing and how do they work?

A

Screen filters by obscuring peoples view, unless they are directly in front of the monitor

42
Q

What is the social engineering attack where the attacker attempts to act as somebody else? And what is a good way to prevent this attack?

A

Impersonation… identity verification

43
Q

What is the social engineering attack where the attacker looks over the Persians shoulder to gain information?

A

Shoulder surfing

44
Q

What is the social engineering attack where the attacker provides false information to their Target in order to influence them to take an action or disclose information? What is an example of this?

A

Disinformation… hoaxes

45
Q

What is the social engineering attack where the attacker follows closely behind another person without showing credentials? What is used to prevent this attack?

A

Tailgating and piggybacking … an access control vestibule/mantrap or a turnstile

46
Q

What is the social engineering attack where the attacker searches through trash or recycling containers to gain information from discarded documents? What prevents this?

A

Dumpster diving… shredding or burning papers instead of throwing them away

47
Q

What is the social engineering attack where the attacker attempts to discover which websites a group of people are likely to visit and then will infect those websites with malware that can then infect the visitors?

A

A watering hole attack

48
Q

What is the social engineering attack where the attacker seeks to exploit the trust and authority of high-level executives or other key personnel within an organization?

A

Business email compromise BEC

49
Q

What are some ways to defend against a BEC attack?

A

Implement strong email security measures, provide employee training on how to recognize and respond to suspicious emails, establish clear procedures for verifying and authorizing sensitive request

50
Q

What is the social engineering attack where the attacker buys a domain name that is similar name to a legitimate domain name?

A

Typosquatting

51
Q

What are three reasons why an attacker may attempt typosquatting?

A

Hosting a malicious website for drive-by malware, earning ad revenue, reselling the domain name for a large profit

52
Q

What is the social engineering attack where the attacker pose as a well-known and trusted company or brand to deceive their targets? What is an example of this?

A

Brand impersonation… a fake website or email that closely resembles a popular retailer bank or technology company

53
Q

What is the social engineering attack where the attacker gathers information without asking for it directly? How did they do this?

A

Elicitation… they start by gaining trust and building rapport and then use techniques to gather information

54
Q

What is the social engineering attack where the attacker makes up a convincing story or scenario to manipulate a Target into providing sensitive information or granting access to restricted systems or areas? How do you defend against this attack?

A

Pre-texting… educate employees about the risks and tactics associated with social engineering, Verifying the identity of an individual requesting information, implementing strict policies and procedures for handling sensitive information and access request

55
Q

What is unwanted or unsolicited email called?

A

Spam

56
Q

What is unwanted messages over instant messaging IM channels? What is one challenge with it?

A

Spam over instant messaging SPIM… it bypasses typical antivirus and spam filters

57
Q

What is the practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link?

A

Phishing

58
Q

What is a more targeted form of fishing that targets specific groups of users or even a single user? What can deter it?

A

Spearfishing… using digital signatures for email signing

59
Q

What is a form of spearfishing that attempts to Target high-level executives?

A

Whaling

60
Q

What is an attack that uses the phone system to trick users into giving up personal and financial information? What technology is often used for this type of attack?

A

Vishing …VOIP…

61
Q

What is the form of fishing that uses text instead of email?

A

Smishing

62
Q

What is the form of fishing that uses text instead of email?

A

Smishing

63
Q

What kind of software detect and removes malware such as viruses Trojans and worms?

A

Antivirus software

64
Q

What are the two methods that antivirus software uses to detect malware?

A

Signature based to detect known malware and heuristic based to detect previously unknown malware

65
Q

What can identify changes to system files? And how do they work and what kind of infection can they detect?

A

File integrity monitors… They calculate hashes on the system files as a baseline, and then periodically recheck the hashed values of those files to see if they are different… root kit infections

66
Q

What makes social engineering so effective?

A

Because they use psychology, base techniques to overcome user objections

67
Q

What techniques do social engineers use?

A

Authority figure, intimidation, faking, scarcity, creating a sense of urgency, establishing familiarity, creating a sense of trust

68
Q

What is the evidence called that a cyber attack is happening or has happened?

A

Indicators of compromise

69
Q

What is OSINT? And how is it used?

A

Open source intelligence… it is used by cyber security professionals and attackers to learn about vulnerabilities, how attackers exploit them, and how organizations can protect against the threats