CompTIA Security+ (SY0-701) Threat Actors E

CalmYellow avatar
CalmYellow
·
·
Download

Start Quiz

Study Flashcards

34 Questions

What are the motivations of threat actors?

To promote financial gain and revenge

What are the attributes that differentiate internal and external threat actors?

Difference in level of sophistication and limited technical expertise

What distinguishes hacktivists from organized crime threat actors?

Driven by financial gain vs. driven by political ideologies

What is the 'how' of an attack referred to as?

Threat vector

Which type of threat vector involves embedding malicious code inside of an image file?

Image-based threat vector

What is the technique where an attacker leaves a malware-infected USB drive in a location for a target to find called?

Baiting

What is a decoy system or network set up to attract potential hackers called?

Honeypots

Which technology is designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats?

Deceptive and Disruption Technologies

What is introduced into a system's DNS server to mislead attackers?

Bogus DNS entries

What is the set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices or spread malware?

BlueBorne

What type of Denial of Service attack targets Bluetooth-enabled devices by sending specially crafted packets?

BlueSmack

Which security mechanism keeps specific services or ports on a network device closed until a specific outbound traffic pattern is detected?

Port Triggering

What type of fake data is sent out when a system detects a network scan attempted by an attacker?

Spoofing fake telemetry data

Which technique involves placing fake folders and files within a system's storage to mislead attackers?

Decoy directories

Which term refers to specific methods and patterns of activities associated with a particular threat actor or group of threat actors?

Tactics, Techniques, and Procedures (TTPs)

What type of cyber attackers are sponsored by governments for cyber espionage or warfare?

Nation-state actors

Which type of threat refers to IT systems, devices, software, or services managed without explicit organizational approval?

Shadow IT

What is the distinction between the intent of the attack and the motivation driving it?

Intent is to cause damage, motivation is for financial gain

Which term refers to individuals or entities within an organization posing a security risk?

Internal threat actors

What do 'script kiddies' rely on to exploit computer systems and networks?

Pre-made software or scripts

What do hacktivists use their technical skills for?

Promote a cause or drive social change

What are some common attack surfaces?

Message-based attacks, image-based attacks, file-based attacks

Which technologies can be used to deceive and detect attackers?

"Honeypots, honeynets, honeyfiles, honeytokens"

"Hiding their identity, disguising their intentions, and using false information or decoy systems" are examples of which tactics employed by threat actors?

"Deception tactics"

What can organizations implement to protect against cyber threats?

Firewalls, antivirus software, intrusion detection systems

What can incident response plans help organizations do in the event of a cyber attack?

All of the above

Which type of cyber threat group is motivated by long-term strategic goals and may conduct false flag attacks?

Nation-state actors

What type of architecture mitigates the risk of insider threats by employing robust access controls and regular audits?

Zero-trust architecture

Which type of cyber threat group is involved in high-profile attacks and targets organizations perceived as acting unethically or against public interest?

Anonymous

What is the use of IT systems, devices, software, applications, and services without organizational approval known as?

Shadow IT

Which type of cyber threat group engages in a variety of illicit activities for financial gain, using custom malware, ransomware, and phishing campaigns?

Organized cybercrime groups

What type of cybersecurity threat originates from within an organization and may take forms such as data theft, sabotage, or misuse of access privileges?

Insider threat

What encompasses all points where an unauthorized user can attempt to enter or extract data?

Threat vectors and attack surfaces

Which group is sponsored by a government to conduct cyber operations against other entities?

Nation-state actors

Study Notes

  • Anonymous: a loosely affiliated hacktivist group involved in high-profile attacks, targeting organizations perceived as acting unethically or against public interest
  • Organized cybercrime groups: well-structured, sophisticated, possess advanced technical capabilities, engage in a variety of illicit activities for financial gain, use custom malware, ransomware, and phishing campaigns
  • Nation-state actors: groups or individuals sponsored by a government to conduct cyber operations against other entities, motivated by long-term strategic goals, may conduct false flag attacks, employ advanced technical skills, and extensive resources
  • Insider threats: cybersecurity threats originating from within an organization, with varying capabilities, may take forms such as data theft, sabotage, or misuse of access privileges, driven by financial gain, revenge, or carelessness
  • Zero-trust architecture: mitigates the risk of insider threats, includes employing robust access controls, conducting regular audits, and providing effective employee security awareness programs
  • Shadow IT: use of IT systems, devices, software, applications, and services without organizational approval, exists due to high security posture or complexities affecting business operations, includes Bring Your Own Devices (BYOD)
  • Threat vectors and attack surfaces: means by which attackers gain unauthorized access to deliver malicious payloads or carry out unwanted actions, encompasses all points where an unauthorized user can attempt to enter or extract data, can be minimized by restricting access.

Prepare for the CompTIA Security+ (SY0-701) exam with study notes on hacktivist and organized cybercrime groups. Learn about Anonymous, a well-known hacktivist collective, and organized cybercrime groups involved in digital criminal activities.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser