Quiz 2 Flashcards
Which threat actor group typically has the least resources & funding?
Script kiddies
What can potentially create a significant risk in an organization by providing attackers an increased attack surface area that isn’t documented in the inventory of hardware & software assets?
Shadow IT
Which attack attempts to steal or exfiltrate data such as emails, contacts, & other information off a victim’s mobile phone via Bluetooth?
Bluesnarfing
About 10 years ago, regarding his notorious/noteworthy incident, Edward Snowden could best be described as which kind of threat actor?
Insider threat
The organization you work for has been in the news a lot recently due to its stance on a local political issue. Which type of threat actor would be the most likely threat to DDoS or deface your public-facing website?
Hacktivist
The help desk at your company is being flooded with calls. Every 15 minutes, Wi-Fi user’s devices disconnect from the network. However, within a minute or so they are able to reconnect & then things work normally for awhile. What type of attack is most likely underway in this situation?
Disassociation attack
A user is receiving certificate errors & warnings in their browser & asks you for help. You run some network tools & see that all of the user’s HTTP & HTTPS traffic is being sent to the same IP address even for different sites. What type of attack is likely occurring?
Man/machine in the middle (aka on path) attack
While looking at the results of a network scan you notice an unusually large amount of address changes in the Layer 2 tables. There are also more ARP & RARP messages than normal. What is likely happening?
MAC flood attack
What term is typically used to refer to when a threat actor exports stolen data from an organization?
Data exfiltration
Which of the following is NOT one of the attributes commonly used to categorize different threat actors?
Years of experience operating as a threat actor