Objective 2.2 Flashcards

Explain common threat vectors and attack surfaces.

1
Q

These below are types of?

  • Message-based
  • Image-based
  • File-based
  • Voice calls
  • Removable devices
  • Use of Unsecured Networks
A

Threat Vectors and Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action

A

Threat Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encompass all the various points where an unauthorized user can try to enter data to or extract data from an environment

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The “how” of the attack

A

Threat Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The “where” of the attack

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Minimize attack surface

A

Restricting access
Removing unnecessary software
Disabling unused protocols
Increase security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Include threats delivered via email, SMS, or other forms of instant messaging.

A

Message-based threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

threat vectors that involve the embedding of malicious code inside of an image file by the threat actor

A

Image-based threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

involve the use of malicious files to deliver a cyber threat.

A

File-based threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

involve the use of calls to trick victims into revealing their sensitive information

A

Voice call-based threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

refer to threats delivered via removable devices such as USB

A

Removable Device threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

refer to the lack of appropriate security measures to protect networks

A

Unsecure Networks trheat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices spread malware

A

BlueBorne

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type of DoS attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device

A

BlueSmack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly