Threat Actors Flashcards

Seccion 3 CompTia

1
Q

What are the different motivations behind threat actors?

A

Data Exfiltration: Unauthorized transfer of data.
Financial Gain: Ransomware, banking trojans.
Blackmail: Threatens to expose sensitive information.
Service Disruption: Disrupt services for chaos, politics, or ransom.
Philosophical/Political Beliefs: Hacktivism by hacktivists.
Ethical Reasons: Ethical hacking to improve security.
Revenge: Retaliation against perceived wrongs.
Disruption/Chaos: Malware or cyberattacks for chaos.
Espionage: Spying for classified information.
War: Cyber warfare to disrupt infrastructure or security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What techniques do hacktivists commonly use to achieve their objectives?

A

Website Defacement, DDoS Attacks, Doxing, Data Leaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What characterizes organized cybercrime groups?

A

They are sophisticated, well-structured syndicates using advanced technical skills for illicit gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What advanced hacking techniques do organized cybercrime groups commonly use?

A

Custom Malware
Ransomware
Sophisticated Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a False Flag Attack?

A

An attack designed to deceive by appearing to come from a different source than the actual perpetrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What advanced techniques do nation-state actors employ in cyber operations?

A

Custom Malware
Zero-Day Exploits
Advanced Persistent Threats (APTs):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Advanced Persistent Threat (APT)?

A

A long-term, targeted cyber intrusion focused on data theft or surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What strategies can organizations employ to mitigate insider threats?

A

Zero-Trust Architecture
Robust Access Controls
Regular Audits
Employee Security Awareness Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Shadow IT?

A

The use of IT systems, devices, software, applications, and services without explicit organizational approval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why does Shadow IT exist?

A

It exists when an organization’s security measures are overly stringent or complex, negatively impacting business operations and leading employees to seek alternative solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Threat Vector?

A

A means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Attack Surface?

A

The total sum of vulnerabilities in a given system that is accessible to an attacker. It encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some common threat vectors used to attack enterprise networks?

A

Messages, images, files, voice calls, removable devices, and unsecure networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is BlueBorne

A

A set of Bluetooth vulnerabilities that allow attackers to take over devices, spread malware, or intercept communications without user interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is BlueSmack?

A

A Denial of Service (DoS) attack targeting Bluetooth-enabled devices by sending specially crafted Logical Link Control and Adaptation Protocol (L2CAP) packets to overwhelm the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Tactics, Techniques, and Procedures (TTPs)?

A

Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors.

17
Q

What are Deceptive and Disruption Technologies?

A

Technologies designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats.

18
Q

What is Port Triggering?

A

A security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected.

19
Q

What is spoofing fake telemetry data?

A

A technique where a system, upon detecting a network scan, sends deceptive information to mislead attackers and protect critical assets.