Threat actors and Vectors Flashcards

1
Q

Name two wireless encryption protocols that are now outdated starting with the letter W

A

WEP, WPA

You want WPA2 or later on all of your wireless access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CVE stand for?

A

Common Vulnerabilities & Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In threat intelligence, what would the acronym STIX stand for?

A

Structured Threat Information eXpression

It describes cyber threat information, including motivations, abilities, capabilities, and response information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In threat intelligence, what does AIS stand for?

A

Automated Indicator sharing

This is a standardized way to share important threat data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In threat intelligence, what does TAXII stand for?

A

Trusted Automated eXchange of Indicator Information.

This is a way of securely sharing STIX data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an IOC?

A

Indicator Of Compromise.

This is an indicator that there is an intrusion in your network with high confidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an RFC?

A

Request for comments.
RFC (stands for Request For Comments) is a document that describes the standards, protocols, and technologies of the Internet and TCP/IP.
Published by the Internet Society (ISOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the IETF?

A

Internet Engineering Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is TTP in threat research?

A

Tactics, techniques, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly