Threat Vectors Flashcards

1
Q

_____ refers to how an intruder connects to a network, often enabled by poor basic security practices by employees.

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______ is used to described when an intruder creates a “foothold” in the network to allow a sustained presence.

A

Persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In ________, this is when an intruder achieves the final objective, whether it is to interfere, monitor, steal, or alter data, deceive, disable, or destroy.

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Utilizing any number of tricks to hide nefarious means.

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The price of being lazy or being restricted by a program office that does not release updates fast enough.

A

Unpatched Software/Improper Server Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One of the most difficult threat vectors to defend against and even harder to detect when an adversary is using this vector.

A

Stolen, Legitimate Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Manipulation of Layer 8 of the OSI Model (The User).

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One of the most serious threats to network security in the world today because of the dependency on email.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This threat vector is a targeted attack accomplished by exploiting a website known to be visited by the actual target.

A

Watering Hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When there are _______ _________ between domains, the authentication mechanism for each domain trusts the authentication mechanism for all other trusted domains.

A

Trust Relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ is a code injection attack used to target data-driven applications with nefarious code.

A

SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scripts executed within user’s browser under the security context of the site they are visiting.

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Any piece of information that objectively describes an intrusion.

A

Indicator of Compromise (IOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly