MITRE ATT&CK Framework Overview

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of Persistence in a cyberattack?

  • Ensuring ongoing access to compromised assets (correct)
  • Deleting all data from compromised assets
  • Preventing access to compromised assets
  • Disabling the compromised assets

Which of the following is NOT a stage in the Cyber Kill Chain according to the text?

  • Analysis (correct)
  • Goals
  • Tactics
  • Techniques

What is a recommended method to control software execution as mentioned in the text?

  • Allow any software to run without restrictions
  • Install all available software for flexibility
  • Use application whitelisting to permit only authorized software (correct)
  • Enable only internet-based software to run

What is the main goal of an attacker during an attack according to the text?

<p>Steal sensitive documents and data (C)</p> Signup and view all the answers

What is recommended to ensure the highest level of data security as mentioned in the text?

<p>Provide least privileged access to sensitive data (B)</p> Signup and view all the answers

What is the primary purpose of the ATT&CK framework developed by MITRE?

<p>To provide a comprehensive taxonomy of attacker tactics and techniques (C)</p> Signup and view all the answers

According to the passage, how can an attacker obtain a user's accidentally typed passwords?

<p>By reading the user's .bash_history file (D)</p> Signup and view all the answers

What is the primary reason why small or non-sensitive organizations may still be targeted by attackers?

<p>They can be used as a stepping stone to attack larger targets (C)</p> Signup and view all the answers

What type of security measure is the ATT&CK framework designed to help defend against?

<p>Application whitelisting (C)</p> Signup and view all the answers

What is the primary goal of the least privilege concept in cybersecurity?

<p>To prevent unauthorized access to sensitive systems and data (C)</p> Signup and view all the answers

Which stage of the Cyber Kill Chain is associated with an attacker maintaining access to a compromised system?

<p>Persistence (B)</p> Signup and view all the answers

What is the primary purpose of application whitelisting in cybersecurity?

<p>To block all unauthorized applications from running (C)</p> Signup and view all the answers

Which of the following is an example of a zero trust security principle?

<p>Requiring multi-factor authentication for sensitive operations (D)</p> Signup and view all the answers

What is a common goal of cyberattacks that involve data exfiltration?

<p>To harvest sensitive data for malicious purposes (B)</p> Signup and view all the answers

Which of the following is the MOST accurate description of an 'insider threat' as discussed in the text?

<p>An employee who has been granted special or privileged access to data and can now cause harm maliciously or unintentionally. (A)</p> Signup and view all the answers

What is the primary goal of an 'insider threat' as described in the text?

<p>To disrupt the reliability and security of the system. (B)</p> Signup and view all the answers

Which of the following is the BEST way to mitigate the risks posed by an 'insider threat' as described in the text?

<p>Provide the third-party developer with the minimum necessary access privileges to perform their tasks. (C)</p> Signup and view all the answers

Which of the following is an example of an 'extended insider' as described in the text?

<p>A trusted third-party vendor who has been granted privileged access to the organization's data and systems. (A)</p> Signup and view all the answers

What is the MAIN implication of the blurred lines between 'workplace' and 'home' as discussed in the text?

<p>Insider threats are more difficult to detect and mitigate when the 'workplace' extends beyond the traditional office environment. (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

Understanding Adversaries.docx

More Like This

MITRE ATT&amp;CK Framework
3 questions

MITRE ATT&amp;CK Framework

PoliteSplendor9142 avatar
PoliteSplendor9142
MITRE ATT&CK Framework and Attack Stages
12 questions
Understanding MITRE ATT&CK
1 questions
Cybersecurity Guide and Concepts
6 questions

Cybersecurity Guide and Concepts

SimplifiedMossAgate1384 avatar
SimplifiedMossAgate1384
Use Quizgecko on...
Browser
Browser