MITRE ATT&CK Framework Overview
19 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of Persistence in a cyberattack?

  • Ensuring ongoing access to compromised assets (correct)
  • Deleting all data from compromised assets
  • Preventing access to compromised assets
  • Disabling the compromised assets
  • Which of the following is NOT a stage in the Cyber Kill Chain according to the text?

  • Analysis (correct)
  • Goals
  • Tactics
  • Techniques
  • What is a recommended method to control software execution as mentioned in the text?

  • Allow any software to run without restrictions
  • Install all available software for flexibility
  • Use application whitelisting to permit only authorized software (correct)
  • Enable only internet-based software to run
  • What is the main goal of an attacker during an attack according to the text?

    <p>Steal sensitive documents and data</p> Signup and view all the answers

    What is recommended to ensure the highest level of data security as mentioned in the text?

    <p>Provide least privileged access to sensitive data</p> Signup and view all the answers

    What is the primary purpose of the ATT&CK framework developed by MITRE?

    <p>To provide a comprehensive taxonomy of attacker tactics and techniques</p> Signup and view all the answers

    According to the passage, how can an attacker obtain a user's accidentally typed passwords?

    <p>By reading the user's .bash_history file</p> Signup and view all the answers

    What is the primary reason why small or non-sensitive organizations may still be targeted by attackers?

    <p>They can be used as a stepping stone to attack larger targets</p> Signup and view all the answers

    What type of security measure is the ATT&CK framework designed to help defend against?

    <p>Application whitelisting</p> Signup and view all the answers

    What is the primary goal of the least privilege concept in cybersecurity?

    <p>To prevent unauthorized access to sensitive systems and data</p> Signup and view all the answers

    Which stage of the Cyber Kill Chain is associated with an attacker maintaining access to a compromised system?

    <p>Persistence</p> Signup and view all the answers

    What is the primary purpose of application whitelisting in cybersecurity?

    <p>To block all unauthorized applications from running</p> Signup and view all the answers

    Which of the following is an example of a zero trust security principle?

    <p>Requiring multi-factor authentication for sensitive operations</p> Signup and view all the answers

    What is a common goal of cyberattacks that involve data exfiltration?

    <p>To harvest sensitive data for malicious purposes</p> Signup and view all the answers

    Which of the following is the MOST accurate description of an 'insider threat' as discussed in the text?

    <p>An employee who has been granted special or privileged access to data and can now cause harm maliciously or unintentionally.</p> Signup and view all the answers

    What is the primary goal of an 'insider threat' as described in the text?

    <p>To disrupt the reliability and security of the system.</p> Signup and view all the answers

    Which of the following is the BEST way to mitigate the risks posed by an 'insider threat' as described in the text?

    <p>Provide the third-party developer with the minimum necessary access privileges to perform their tasks.</p> Signup and view all the answers

    Which of the following is an example of an 'extended insider' as described in the text?

    <p>A trusted third-party vendor who has been granted privileged access to the organization's data and systems.</p> Signup and view all the answers

    What is the MAIN implication of the blurred lines between 'workplace' and 'home' as discussed in the text?

    <p>Insider threats are more difficult to detect and mitigate when the 'workplace' extends beyond the traditional office environment.</p> Signup and view all the answers

    More Like This

    MITRE ATT&amp;CK Framework
    3 questions

    MITRE ATT&amp;CK Framework

    PoliteSplendor9142 avatar
    PoliteSplendor9142
    MITRE ATT&CK Framework and Attack Stages
    12 questions
    Cybersecurity Guide and Concepts
    6 questions

    Cybersecurity Guide and Concepts

    SimplifiedMossAgate1384 avatar
    SimplifiedMossAgate1384
    Bartolomé Mitre and Domingo Sarmiento
    37 questions
    Use Quizgecko on...
    Browser
    Browser