Review Questions SYS701 - 2
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following measures is not commonly used to assess threat intelligence?

  • Timeliness
  • Detail (correct)
  • Accuracy
  • Relevance

Which one of the following motivations is most commonly attributed to hacktivists?

  • Ethical
  • War
  • Financial gain
  • Political/philosophical beliefs (correct)

Kolin is a penetration tester who works for a cybersecurity company. His firm was hired to conduct a penetration test against a health-care system, and Kolin is working to gain access to the systems belonging to a hospital in that system. What term best describes Kolin's work?

  • Unknown attacker
  • Semi-authorized attacker
  • Authorized attacker (correct)
  • Unauthorized attacker

Which one of the following attackers is most likely to be associated with an APT?

<p>Nation-state actor (A)</p> Signup and view all the answers

Which organization did the U.S. government help create to share knowledge between organizations in specific verticals?

<p>ISACs (D)</p> Signup and view all the answers

Which of the following threat actors typically has the greatest access to resources?

<p>Nation-state actors (A)</p> Signup and view all the answers

Of the threat vectors shown here, which one is most commonly exploited by attackers who are at a distant location?

<p>Email (A)</p> Signup and view all the answers

Which one of the following is the best example of a hacktivist group?

<p>Anonymous (D)</p> Signup and view all the answers

What type of assessment is particularly useful for identifying insider threats?

<p>Behavioral (A)</p> Signup and view all the answers

Cindy is concerned that her organization may be targeted by a supply chain attack and is conducting a review of all of her vendor and supplier partners. Which one of the following organizations is least likely to be the conduit for a supply chain attack?

<p>Talent provider (D)</p> Signup and view all the answers

Greg believes that an attacker may have installed malicious firmware in a network device before it was provided to his organization by the supplier. What type of threat vector best describes this attack?

<p>Supply chain (A)</p> Signup and view all the answers

Ken is conducting threat research on Transport Layer Security (TLS) and would like to consult the authoritative reference for the protocol's technical specification. What resource would best meet his needs?

<p>Internet RFCs (B)</p> Signup and view all the answers

Wendy is scanning cloud-based repositories for sensitive information. Which one of the following should concern her most, if discovered in a public repository?

<p>API keys (C)</p> Signup and view all the answers

Which one of the following threat research tools is used to visually display information about the location of threat actors?

<p>Threat map (A)</p> Signup and view all the answers

Vince recently received the hash values of malicious software that several other firms in his industry found installed on their systems after a compromise. What term best describes this information?

<p>IoC (B)</p> Signup and view all the answers

Ursula recently discovered that a group of developers are sharing information over a messaging tool provided by a cloud vendor but not sanctioned by her organization. What term best describes this use of technology?

<p>Shadow IT (A)</p> Signup and view all the answers

Tom's organization recently learned that the vendor is discontinuing support for their customer relationship management (CRM) system. What should concern Tom the most from a security perspective?

<p>Unavailability of future patches (A)</p> Signup and view all the answers

Which one of the following information sources would not be considered an OSINT source?

<p>Port scans (C)</p> Signup and view all the answers

Edward Snowden was a government contractor who disclosed sensitive government documents to journalists to uncover what he believed were unethical activities. Which of the following terms best describe Snowden's activities? (Choose two.)

<p>Hacktivist (C), Insider (A)</p> Signup and view all the answers

Renee is a cybersecurity hobbyist. She receives an email about a new web-based grading system being used by her son's school and she visits the site. She notices that the URL for the site looks like this:

www.myschool.edu/grades.php&studentID=1023425

She realizes that 1023425 is her son's student ID number and she then attempts to access the following similar URLs:

www.myschool.edu/grades.php&studentID=1023423

www.myschool.edu/grades.php&studentID=1023424

www.myschool.edu/grades.php&studentID=1023426

www.myschool.edu/grades.php&studentID=1023427

When she does so, she accesses the records of other students. She closes the records and immediately informs the school principal of the vulnerability. What term best describes Renee's work?

<p>Semi-authorized hacking (C)</p> Signup and view all the answers

Flashcards

Threat Intelligence Assessment

Measures used to evaluate threat intelligence effectiveness.

Motivation of Hacktivists

Political or philosophical beliefs driving hacktivism.

Authorized Attacker

A person granted permission to test system vulnerabilities.

APT Attackers

Advanced Persistent Threat attackers often linked to nations.

Signup and view all the flashcards

ISACs

Organizations aiding in knowledge sharing among sectors.

Signup and view all the flashcards

Resource Access by Threat Actors

Nation-state actors typically have high resource access.

Signup and view all the flashcards

Commonly Exploited Threat Vector

Email is a frequently exploited threat vector from afar.

Signup and view all the flashcards

Example of Hacktivist Group

Anonymous, known for politically motivated hacking.

Signup and view all the flashcards

Identifying Insider Threats

Behavioral assessments help in finding insider threats.

Signup and view all the flashcards

Supply Chain Attack Conduit

Talent providers are least likely conduits for supply chain attacks.

Signup and view all the flashcards

Supply Chain Threat Vector

Malicious firmware in devices denotes a supply chain issue.

Signup and view all the flashcards

Resource for TLS Research

Internet RFCs provide specifications for Transport Layer Security.

Signup and view all the flashcards

Sensitive Info Concern

API keys found in public repositories are very concerning.

Signup and view all the flashcards

Threat Research Tool

Threat maps visually show locations of threat actors.

Signup and view all the flashcards

Malicious Software Hash Values

Indicators of Compromise (IoCs) refers to malware hash values.

Signup and view all the flashcards

Use of Unauthorized Technology

Shadow IT refers to unauthorized technology use for work.

Signup and view all the flashcards

Concern Over CRM Support

Unavailability of future patches poses security risks.

Signup and view all the flashcards

Not an OSINT Source

Port scans are not considered Open Source Intelligence.

Signup and view all the flashcards

Edward Snowden's Activities

Snowden's actions are described as hacktivism due to disclosure for ethics.

Signup and view all the flashcards

Renee's Hacking Work

Semi-authorized hacking refers to testing without full permission but with some consent.

Signup and view all the flashcards

More Like This

Teacher Review Questions
19 questions

Teacher Review Questions

EntrancingInequality avatar
EntrancingInequality
AP Review Questions Chapter 32
16 questions
UPCAT Review Questions Compilation
48 questions
Review Questions 1 SYS701
18 questions

Review Questions 1 SYS701

ComplimentaryAluminium4948 avatar
ComplimentaryAluminium4948
Use Quizgecko on...
Browser
Browser