Quiz 2 Flashcards

1
Q

Which threat actor group typically has the least resources & funding?

A

Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can potentially create a significant risk in an organization by providing attackers an increased attack surface area that isn’t documented in the inventory of hardware & software assets?

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which attack attempts to steal or exfiltrate data such as emails, contacts, & other information off a victim’s mobile phone via Bluetooth?

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

About 10 years ago, regarding his notorious/noteworthy incident, Edward Snowden could best be described as which kind of threat actor?

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The organization you work for has been in the news a lot recently due to its stance on a local political issue. Which type of threat actor would be the most likely threat to DDoS or deface your public-facing website?

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The help desk at your company is being flooded with calls. Every 15 minutes, Wi-Fi user’s devices disconnect from the network. However, within a minute or so they are able to reconnect & then things work normally for awhile. What type of attack is most likely underway in this situation?

A

Disassociation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user is receiving certificate errors & warnings in their browser & asks you for help. You run some network tools & see that all of the user’s HTTP & HTTPS traffic is being sent to the same IP address even for different sites. What type of attack is likely occurring?

A

Man/machine in the middle (aka on path) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

While looking at the results of a network scan you notice an unusually large amount of address changes in the Layer 2 tables. There are also more ARP & RARP messages than normal. What is likely happening?

A

MAC flood attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What term is typically used to refer to when a threat actor exports stolen data from an organization?

A

Data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is NOT one of the attributes commonly used to categorize different threat actors?

A

Years of experience operating as a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly