Threat Vectors 2.2 Flashcards

1
Q

A […] is the method used by a threat actor to gain access to your systems

A

Threat Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A […] vector involves the use of email or SMS texts

Ex:
- Bogus Links
- Phishing Attacks

A

Message-Based Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An […] uses an image to initiate an attack

It does this by embedding a script inside the images XML (the image description), which runs when the image is opened.

A

Image-Based Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A […] initiates attacks through the use of files (.exe, .PDF, ZIP/RAR)

A

File-Based Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A […] initiates attacks through the phone

(Vishing = Phishing over the phone)

A

Voice Call Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A […] initiates attacks through a USB or other detachable peripherals

A

Removable Device Vecorr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A […] initiates attacks through an unpatched piece of software

A

Vulnerable Software Vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An […] initiates attacks through a legacy OS or piece of equipment, which no longer receives support / security updates

A

Unsupported System Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An […] initiates attacks through the network

Ex:
- Outdated security protocols
- Rogue APs
- No 802.1x
- Bluetooth Reconnaissance

A

Insecure Network Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An […] initiates attacks through the network

Ex:
- Outdated security protocols
- Rogue APs
- No 802.1x implemented
- Bluetooth reconnaissance

A

Unsecure Network Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

[…] allow an attacker to gain access to the network, and can be prevented by implementing firewall rules

A

Open Service Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

[…] allows an attacker to easily gain access to a system, unless it is changed to something more secure

A

Default Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

[…] initiates attacks by tampering with equipment, usually as it’s manufactured.

Ex:
- MSP is attacked and the attacker now has access to the networks the MSP supports
- Gain access to a network through a vendor (Jump from HVAC network to Main Network)
- Fake Cisco switches

A

Supply Chain Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly