Capital One Data Breach 2019

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What was the main entry point used by hackers in the data breach mentioned?

  • Unpatched vulnerability in Microsoft IIS
  • Unpatched vulnerability in Apache Struts (correct)
  • Unpatched vulnerability in Apache Tomcat
  • Unpatched vulnerability in Nginx

How long did the hackers go undetected after gaining access to the corporate network?

  • 45 days
  • 60 days
  • 76 days (correct)
  • 30 days

What type of information did the hackers exfiltrate from the corporate network?

  • Customer financial records
  • Employee credentials (correct)
  • Employee emails
  • Corporate marketing materials

How much did Equifax pay in settlement as a result of the data breach?

<p>$575 million (A)</p> Signup and view all the answers

What was Brian Krebs' response to Equifax's handling of the breach?

<p>&quot;A dumpster fire&quot; (C)</p> Signup and view all the answers

What theory emerged due to the fact that none of the exfiltrated data were sold on the darknet?

<p>A nation state was behind the breach (B)</p> Signup and view all the answers

What was the initial attack vector for the data exfiltration in the Capital One data breach?

<p>Misconfigured Web Application Firewall (B)</p> Signup and view all the answers

Which of the following types of data was NOT compromised in the Capital One data breach?

<p>Biometric data (B)</p> Signup and view all the answers

What is the key factor decision-makers use to determine whether to fix a risk?

<p>The comparison between Y and X (C)</p> Signup and view all the answers

Who did the US charge with the data breach of stealing victims' data?

<p>Chinese military officers (D)</p> Signup and view all the answers

Why might it not be financially worthwhile to eliminate a low-impact risk?

<p>The cost of eliminating it exceeds the potential impact (C)</p> Signup and view all the answers

What did the Chinese government do in response to the accusations regarding the data breach?

<p>Denied the accusations (D)</p> Signup and view all the answers

Why is resolving issues with a high impact considered worth the costs?

<p>They can lead to significant losses (C)</p> Signup and view all the answers

What is the role of the AWS metadata service in the AWS environment?

<p>Provides credentials to resources (D)</p> Signup and view all the answers

What is the purpose of risk management in a business?

<p>To provide decision-makers with fact-based risk assessments (B)</p> Signup and view all the answers

Which layer of firewall is a Web Application Firewall (WAF) according to the text?

<p>Layer 7 (A)</p> Signup and view all the answers

Why does a higher risk require more urgent attention and resources compared to a lower risk?

<p>Higher risks have more severe consequences (D)</p> Signup and view all the answers

Which corporations were mentioned as victims of data exfiltration attacks in the text?

<p>Facebook and Capital One (C)</p> Signup and view all the answers

What was the reason behind Capital One's $80 million fine?

<p>Failure to identify and manage risks associated with cloud storage (B)</p> Signup and view all the answers

In the Facebook data breach discussed, what technique was used to harvest user data?

<p>Scraping (B)</p> Signup and view all the answers

What type of information was extracted by malicious actors in the Facebook data breach?

<p>User names and phone numbers (D)</p> Signup and view all the answers

What specific function on Facebook was abused in the 2019 data breach?

<p>The search function (B)</p> Signup and view all the answers

Which scandal prompted Facebook to disable the feature that was abused in the 2019 data breach?

<p>Cambridge Analytica scandal (C)</p> Signup and view all the answers

What was the method used by malicious actors to check if a Facebook profile matched a phone number?

<p><code>Scraping</code> technique (A)</p> Signup and view all the answers

What defines a cyber risk?

<p>The combination of the likelihood of a threat occurring and its impact on an organization. (C)</p> Signup and view all the answers

What differentiates a cyber event from a non-cyber event?

<p>Whether it occurs in cyberspace or not. (A)</p> Signup and view all the answers

How are cyber risks related to cyber threats?

<p>Cyber risks originate from cyber threats and their likelihood of occurrence. (A)</p> Signup and view all the answers

Which factor is crucial in risk management according to the text?

<p>Addressing both cyber risks and cyber threats. (B)</p> Signup and view all the answers

What is emphasized as the source of a risk in the text?

<p>Potential harm to the organization. (C)</p> Signup and view all the answers

In relation to cyber risks, what is the significance of addressing cyber threats?

<p>It assists in evaluating the likelihood of cyber risks affecting an organization. (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Capital Lease Accounting Overview
40 questions
Capital Cities of Canada Flashcards
26 questions
Capital Markets Overview
40 questions
Use Quizgecko on...
Browser
Browser