Module 1: Introduction to Security Q Flashcards
Which type of threat actor would benefit the most from accessing your enterprise’s new machine learning algorithm research and development program?
Competitors
Competitors are threat actors who launch attacks against an opponent’s system to steal classified information like industry research or customer lists
Which of the following types of platforms is known for its vulnerabilities due to age?
Legacy platform
Legacy platforms are no longer in widespread use, often because they have been replaced by an updated version of the earlier technology
Your enterprise has played fast and loose with customer information for years. While there has been no significant breach of information that could damage the organization and/or their customers, many in the enterprise feel it is only a matter of time before a major leak occurs.
Which type of threat actor is an employee who wishes to personally ensure that the enterprise is exposed and blocked from accessing their customers’ information until they ensure more secure protocols?
Hacktivist
A hacktivist is strongly motivated by ideology for the sake of their principles or beliefs
Threat actors focused on financial gain often attack which of the following main target categories?
Individual users
This category focuses on individuals as the victims. Threat actors steal and use data, credit card numbers, online financial account information, or social security numbers or send millions of spam emails to peddle counterfeit drugs, pirated software, fake watches, and pornography to profit from their victims
Which issue can arise from security updates and patches?
Difficulty patching firmware
Updating firmware to address a vulnerability can often be difficult and requires specialized steps. Furthermore, some firmware cannot be patched
Which of the following is an attack vector used by threat actors to penetrate a system?
Almost 94 percent of all malware is delivered through email to an unsuspecting user. The goal is to trick the user into opening an attachment that contains malware or click on a hyperlink that takes the user to a fictitious website
What is a variation of a common social engineering attack targeting a specific user?
Spear phishing
Spear phishing targets specific users. The emails used in spear phishing are customized to the recipients, including their names and personal information, to make the message appear legitimate
Which of the following is a social engineering method that attempts to influence the subject before the event occurs?
Prepending
Prepending attempts to influence the subject before the attack event occurs. A common general example is a preview of a soon-to-be-released movie that begins with the statement, “The best film you will see this year!” Threat actors use prepending with social engineering attacks, such as including the desired outcome in a statement that uses the urgency principle, as in “You need to reset my password immediately because my meeting with the board starts in five minutes.”
Which attack embeds malware-distributing links in instant messages?
Spim
Spim is spam delivered through an IM service instead of email
Your enterprise experienced several technical issues over the last few days. There were multiple instances of passwords needing to be changed and other issues causing downtime. Management has started receiving voicemails regarding fraudulent activities on their accounts. While the voicemails sound authentic, the help desk concludes that they are fake.
What type of malicious activity will this be considered?
Vishing
Instead of using email to contact the potential victim, attackers can use phone calls. Known as vishing (voice phishing), an attacker calls a victim who, upon answering, hears a recorded message that pretends to be from the user’s bank stating that their credit card shows fraudulent activity or that the bank account shows unusual activity. The victim is instructed to immediately call a specific phone number (which the attacker has set up). When the victim calls, it is answered by automated instructions telling them to enter their credit card number, bank account number, social security number, or other information on the phone’s keypad
Attackers have taken over a site commonly used by an enterprise’s leadership team to order new raw materials. The site is also visited by leadership at several other enterprises, so taking this site will allow for attacks on many organizations.
Which type of malicious activity is this?
Watering hole
A watering hole attack is directed towards a smaller group of specific individuals, such as the top executives working for a manufacturing company. These executives all tend to visit a common website, such as a parts supplier to the manufacturer. An attacker who wants to target this group of executives tries to determine the common website they frequent and then infects it with malware that will make its way onto the group’s computers
Over the last few days, several employees in your enterprise reported seeing strange messages containing links in their company’s IM account. Even though no one has clicked on the messages, they are spreading throughout the network.
Which type of malicious activity is this?
Spimming
Spim is spam delivered through instant messaging (IM) instead of email. For threat actors, spim can have even more impact than spam. The immediacy of instant messages makes users more likely to reflexively click embedded links in a spim
Which threat actors sell their knowledge to other attackers or governments?
Brokers
Brokers sell their knowledge of a weakness to other attackers or governments
Which of the following is the most common method for delivering malware?
Almost 94 percent of all malware is delivered through email to an unsuspecting user. The goal is to trick the user into opening an attachment that contains malware or click a hyperlink that takes the user to a fictitious website
Which of the following computing platforms is highly vulnerable to attacks?
Legacy
Old and outdated computing resources used in legacy platforms make them highly vulnerable