Outsmarting Threat Actors Flashcards

1
Q

What is one of the most effective ways to learn from different threat actors attacking your network?

A

Set up and utilize deception and disruption technologies

Deception technologies help to mislead attackers while disruption technologies neutralize threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does TTPs stand for in the context of threat actors?

A

Tactics, Techniques, and Procedures

TTPs refer to specific methods and patterns of activities associated with particular threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are deceptive and disruption technologies designed to do?

A

Mislead, confuse, and divert attackers while detecting and neutralizing threats

These technologies protect critical assets from attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a honeypot?

A

A decoy system or network set up to attract potential hackers

Honeypots are used to gather information about attackers’ methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a honeynet?

A

A network of honeypots designed to mimic an entire network of systems

Honeynets create a more complex environment for attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are honeyfiles?

A

Decoy files placed within a system to lure in potential attackers

Honeyfiles help in identifying intrusions by monitoring access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are honeytokens?

A

A piece of data or resource that has no legitimate value but is monitored for access or use

Honeytokens help in detecting unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are bogus DNS entries?

A

Fake Domain Name System entries introduced into your system’s DNS server

These entries can mislead attackers and protect real DNS data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of creating decoy directories?

A

To place fake folders and files within a system’s storage

Decoy directories can distract and confuse attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is dynamic page generation effective against?

A

Automated scraping tools or bots trying to index or steal content

This technique helps protect web content from being misused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is port triggering?

A

A security mechanism where specific services remain closed until a specific outbound traffic pattern is detected

Port triggering helps to hide services from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does spoofing fake telemetry data involve?

A

Sending out fake telemetry or network data when a network scan is detected

This can mislead attackers about the network’s actual status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly