(8) Threats and the Compute Environment Flashcards

1
Q

What is adversary capability?

A

Adversary capability involves the resources, ability, and intent of threat actors or orgs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an attack vector?

A

An attack vector is the means as to how an attacker can access their target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is threat modeling based off of?

A

Threat modeling is based off of a lot of different factors, such as the ability of the threat actor, the attack surface, potential attack vectors, the impact of a successful attack and the chance that an attack may succeed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is threat reputation?

A

Threat reputation is where a company or workgroup does research to consider “What has this person done in the past and what are the chances that they would do it again given some variables?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When it comes to reviewing the company’s attack surface, what is edge discovery?

A

Edge discovery is about scanning that reveals any systems or devices that are publicly exposed by scanning the company’s IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When it comes to reviewing the company’s attack surface, what is passive discovery?

A

Passive discovery involves techniques that monitor inbound and outbound traffic to detect devices that were missed during discovery operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When it comes to reviewing the company’s attack surface, what is security controls testing?

A

Security controls testing is such that makes sure that the org’s defenses are working correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When it comes to reviewing the company’s attack surface, what is penetration testing and adversary emulation?

A

Penetration testing and adversary emulation is all about simulating an actual attack to see if there are any issues in the org’s security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is attack surface reduction?

A

Attack surface reduction involves any changes to the computing environment that happen to help lower the ways that an enemy may try to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly