Chapter 5 Threat and Vulnerability Management Mark B Flashcards
Which of the following intelligence types focuses on the threat actor and the reason for the attack?
A. Tactical
B. Strategic
C. Targeted
D. Operational
A. Tactical
What is used as a common vector to launch a broad range of attacks?
A. Tactical
B. Strategic
C. Commodity Malware
D. Targeted attacks
C. Commodity Malware
What type of attack would use spear phishing against engineers in the Ukraine electricity supply industry with the goal of gaining user credentials?
A. Deep web
B. Proprietary
C. Commodity Malware
D. Targeted attacks
D. Targeted attacks
Which of the following intelligence types focuses on the technical and automated discovery of everyday threats, threat actors and the reason for the attack?
A. Tactical
B. Strategic
C. Commodity malware
D. Operational threat intelligence
A. Tactical
Which of the following intelligence types uses forensics and historical logs to identify threats?
A. Tactical
B. Strategic
C. Commodity malware
D. Operational threat intelligence
D. Operational threat intelligence
What framework could a forensic team use to document a specific adversary, victim, capabilities and infrastructure?
A. Threat emulation
B. Threat hunting
C. Diamond model
D. STIX
C. Diamond model
What is the most likely threat actor if your router firmware has been tampered with over a period of two years, without being detected?
A. Advanced persistent threat
B. Insider threat
C. Hacktivist
D. Script kiddie
A. Advanced persistent threat
What is the most likely threat actor if your electrical power delivery capabilities are attacked?
A. Nation State
B. Insider threat
C. Hacktivist
D. Script Kiddie
A. Nation State
What threat actor will most likely steal your intellectual property?
A. Advanced persistent threat
B. Competitor
C. Hacktivist
D. Script kiddie
B. Competitor
What is the threat when vulnerabilities are present on your network due to misconfiguration by poorly trained technicians?
A. Advanced persistent threat
B. Insider threat
C. Script kiddie
D. Organized Crime
B. Insider threat
What is the threat when vulnerabilities are present due to the use of third party libraries in our code base?
A. Advanced persistent threat
B. Supply Chain
C. Insider Threat
D. Organized Crime
B. Supply Chain
What is the likely threat actor when thousands of systems are targeted with crypto malware followed up with a demand for $5,000 in bitcoin?
A. Advanced persistent threat
B. Supply chain
C. Insider threat
D. Organized Crime
D. Organized Crime
What is the public network that hosts unindexed and unsearchable content that may be useful for unlawful activities?
A. World Wide Web
B. Intranet
C. Deep web
D. Proprietary networks
C. Deep web
What type of intelligence gathering would involve DNS record harrvesting?
A. Intelligence feeds
B. Deep Web
C. Open Source Intelligence
D. Human intelligence
C. Open Source Intelligence
What type of intelligence gathering would involve physical reconnaissance?
A. Intelligence feeds
B. Deep Web
C. Open Source Intelligence (OSINT)
D. Human intelligence (HUMINT)
D. Human intelligence (HUMINT)