Defend Against Cyber Attacks
17 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which step in the Cyber Kill Chain framework involves designing a piece of malware to exploit a specific vulnerability?

  • Reconnaissance
  • Exploitation
  • Weaponization (correct)
  • Delivery
  • What is the purpose of the Cyber Kill Chain framework?

  • To gather information about the target
  • To identify vulnerabilities in digital networks
  • To outline the steps of a typical cyber attack (correct)
  • To exploit specific vulnerabilities
  • What does the term 'kill chain' in the Cyber Kill Chain framework refer to?

  • A set of steps that must be completed in order (correct)
  • The design of malware to exploit vulnerabilities
  • A specific vulnerability in a digital network
  • The gathering of information about the target
  • Which step in the Cyber Kill Chain framework involves gathering information about the target?

    <p>Reconnaissance (D)</p> Signup and view all the answers

    What is the role of Lockheed Martin in the development of the Cyber Kill Chain framework?

    <p>They identified parallels between military and cyber intrusions (A)</p> Signup and view all the answers

    What is the second step in the Cyber Kill Chain framework?

    <p>Weaponization (A)</p> Signup and view all the answers

    How many steps are there in the Cyber Kill Chain framework?

    <p>Seven (A)</p> Signup and view all the answers

    What can be achieved during the Reconnaissance stage of a cyber attack?

    <p>Probing digital servers (A)</p> Signup and view all the answers

    Which company developed the Cyber Kill Chain framework?

    <p>Lockheed Martin (D)</p> Signup and view all the answers

    What is the first step in the Cyber Kill Chain framework?

    <p>Reconnaissance (B)</p> Signup and view all the answers

    What is the term used to describe the process of activating malware on a target system?

    <p>Exploitation (A)</p> Signup and view all the answers

    What is the purpose of establishing a Command and Control (C2) channel in a cyber attack?

    <p>To communicate with the compromised systems (A)</p> Signup and view all the answers

    What does the MITRE ATT&CK matrix stand for?

    <p>Adversarial Tactics, Techniques, and Common Knowledge (A)</p> Signup and view all the answers

    What is the purpose of the MITRE ATT&CK matrix?

    <p>To help organizations examine cyber attacks in a simplified form (C)</p> Signup and view all the answers

    Which of the following is NOT a technique that a cyber attacker can use to gain credentialed access to a system?

    <p>Installing remote access programs (D)</p> Signup and view all the answers

    What is the most common method for delivering malware to a target system?

    <p>Sending it via email (B)</p> Signup and view all the answers

    What is the purpose of the Exploitation phase in a cyber attack?

    <p>To activate the malware on the target system (B)</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser