Podcast
Questions and Answers
Which of the following measures is not commonly used to assess threat intelligence?
Which of the following measures is not commonly used to assess threat intelligence?
- Timeliness
- Detail (correct)
- Accuracy
- Relevance
Which one of the following motivations is most commonly attributed to hacktivists?
Which one of the following motivations is most commonly attributed to hacktivists?
- Ethical
- War
- Financial gain
- Political/philosophical beliefs (correct)
Kolin is a penetration tester who works for a cybersecurity company. His firm was hired to conduct a penetration test against a health-care system, and Kolin is working to gain access to the systems belonging to a hospital in that system. What term best describes Kolin's work?
Kolin is a penetration tester who works for a cybersecurity company. His firm was hired to conduct a penetration test against a health-care system, and Kolin is working to gain access to the systems belonging to a hospital in that system. What term best describes Kolin's work?
- Unknown attacker
- Semi-authorized attacker
- Authorized attacker (correct)
- Unauthorized attacker
Which one of the following attackers is most likely to be associated with an APT?
Which one of the following attackers is most likely to be associated with an APT?
Which organization did the U.S. government help create to share knowledge between organizations in specific verticals?
Which organization did the U.S. government help create to share knowledge between organizations in specific verticals?
Which of the following threat actors typically has the greatest access to resources?
Which of the following threat actors typically has the greatest access to resources?
Of the threat vectors shown here, which one is most commonly exploited by attackers who are at a distant location?
Of the threat vectors shown here, which one is most commonly exploited by attackers who are at a distant location?
Which one of the following is the best example of a hacktivist group?
Which one of the following is the best example of a hacktivist group?
What type of assessment is particularly useful for identifying insider threats?
What type of assessment is particularly useful for identifying insider threats?
Cindy is concerned that her organization may be targeted by a supply chain attack and is conducting a review of all of her vendor and supplier partners. Which one of the following organizations is least likely to be the conduit for a supply chain attack?
Cindy is concerned that her organization may be targeted by a supply chain attack and is conducting a review of all of her vendor and supplier partners. Which one of the following organizations is least likely to be the conduit for a supply chain attack?
Greg believes that an attacker may have installed malicious firmware in a network device before it was provided to his organization by the supplier. What type of threat vector best describes this attack?
Greg believes that an attacker may have installed malicious firmware in a network device before it was provided to his organization by the supplier. What type of threat vector best describes this attack?
Ken is conducting threat research on Transport Layer Security (TLS) and would like to consult the authoritative reference for the protocol's technical specification. What resource would best meet his needs?
Ken is conducting threat research on Transport Layer Security (TLS) and would like to consult the authoritative reference for the protocol's technical specification. What resource would best meet his needs?
Wendy is scanning cloud-based repositories for sensitive information. Which one of the following should concern her most, if discovered in a public repository?
Wendy is scanning cloud-based repositories for sensitive information. Which one of the following should concern her most, if discovered in a public repository?
Which one of the following threat research tools is used to visually display information about the location of threat actors?
Which one of the following threat research tools is used to visually display information about the location of threat actors?
Vince recently received the hash values of malicious software that several other firms in his industry found installed on their systems after a compromise. What term best describes this information?
Vince recently received the hash values of malicious software that several other firms in his industry found installed on their systems after a compromise. What term best describes this information?
Ursula recently discovered that a group of developers are sharing information over a messaging tool provided by a cloud vendor but not sanctioned by her organization. What term best describes this use of technology?
Ursula recently discovered that a group of developers are sharing information over a messaging tool provided by a cloud vendor but not sanctioned by her organization. What term best describes this use of technology?
Tom's organization recently learned that the vendor is discontinuing support for their customer relationship management (CRM) system. What should concern Tom the most from a security perspective?
Tom's organization recently learned that the vendor is discontinuing support for their customer relationship management (CRM) system. What should concern Tom the most from a security perspective?
Which one of the following information sources would not be considered an OSINT source?
Which one of the following information sources would not be considered an OSINT source?
Edward Snowden was a government contractor who disclosed sensitive government documents to journalists to uncover what he believed were unethical activities. Which of the following terms best describe Snowden's activities? (Choose two.)
Edward Snowden was a government contractor who disclosed sensitive government documents to journalists to uncover what he believed were unethical activities. Which of the following terms best describe Snowden's activities? (Choose two.)
Renee is a cybersecurity hobbyist. She receives an email about a new web-based grading system being used by her son's school and she visits the site. She notices that the URL for the site looks like this:
www.myschool.edu/grades.php&studentID=1023425
She realizes that 1023425 is her son's student ID number and she then attempts to access the following similar URLs:
www.myschool.edu/grades.php&studentID=1023423
www.myschool.edu/grades.php&studentID=1023424
www.myschool.edu/grades.php&studentID=1023426
www.myschool.edu/grades.php&studentID=1023427
When she does so, she accesses the records of other students. She closes the records and immediately informs the school principal of the vulnerability. What term best describes Renee's work?
Renee is a cybersecurity hobbyist. She receives an email about a new web-based grading system being used by her son's school and she visits the site. She notices that the URL for the site looks like this:
www.myschool.edu/grades.php&studentID=1023425
She realizes that 1023425 is her son's student ID number and she then attempts to access the following similar URLs:
www.myschool.edu/grades.php&studentID=1023423
www.myschool.edu/grades.php&studentID=1023424
www.myschool.edu/grades.php&studentID=1023426
www.myschool.edu/grades.php&studentID=1023427
When she does so, she accesses the records of other students. She closes the records and immediately informs the school principal of the vulnerability. What term best describes Renee's work?
Flashcards
Threat Intelligence Assessment
Threat Intelligence Assessment
Measures used to evaluate threat intelligence effectiveness.
Motivation of Hacktivists
Motivation of Hacktivists
Political or philosophical beliefs driving hacktivism.
Authorized Attacker
Authorized Attacker
A person granted permission to test system vulnerabilities.
APT Attackers
APT Attackers
Signup and view all the flashcards
ISACs
ISACs
Signup and view all the flashcards
Resource Access by Threat Actors
Resource Access by Threat Actors
Signup and view all the flashcards
Commonly Exploited Threat Vector
Commonly Exploited Threat Vector
Signup and view all the flashcards
Example of Hacktivist Group
Example of Hacktivist Group
Signup and view all the flashcards
Identifying Insider Threats
Identifying Insider Threats
Signup and view all the flashcards
Supply Chain Attack Conduit
Supply Chain Attack Conduit
Signup and view all the flashcards
Supply Chain Threat Vector
Supply Chain Threat Vector
Signup and view all the flashcards
Resource for TLS Research
Resource for TLS Research
Signup and view all the flashcards
Sensitive Info Concern
Sensitive Info Concern
Signup and view all the flashcards
Threat Research Tool
Threat Research Tool
Signup and view all the flashcards
Malicious Software Hash Values
Malicious Software Hash Values
Signup and view all the flashcards
Use of Unauthorized Technology
Use of Unauthorized Technology
Signup and view all the flashcards
Concern Over CRM Support
Concern Over CRM Support
Signup and view all the flashcards
Not an OSINT Source
Not an OSINT Source
Signup and view all the flashcards
Edward Snowden's Activities
Edward Snowden's Activities
Signup and view all the flashcards
Renee's Hacking Work
Renee's Hacking Work
Signup and view all the flashcards