4_2_3 Section 4 – Operations and Incident Response - 4.2 – Incident Response - Attack Frameworks
22 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary challenge in protecting a network from attacks?

  • Responding to an attack after it occurs
  • Keeping track of the numerous methods used by attackers (correct)
  • Mitigating the risk of an attack
  • Identifying the exact type of attack

What is the main purpose of the MITRE ATT&CK framework?

  • To provide a comprehensive view of network attacks (correct)
  • To support US governmental agencies
  • To categorize attacks into broad categories
  • To identify security techniques to block future attacks

Where can you access the MITRE ATT&CK framework?

  • us.gov/agencies
  • mitre.org
  • attack.mitre.org (correct)
  • itsecurity.com

What is the location of the MITRE corporation?

<p>Northeast United States (A)</p> Signup and view all the answers

What is the primary benefit of using the MITRE ATT&CK framework?

<p>Identifying security techniques to block future attacks (B)</p> Signup and view all the answers

Who does the MITRE corporation primarily support?

<p>US governmental agencies (D)</p> Signup and view all the answers

What is the primary goal of filling in documentation at each point of an intrusion?

<p>To understand the attack and prevent future occurrences (B)</p> Signup and view all the answers

Which phase of the cyber kill chain involves gathering intel on the target?

<p>Reconnaissance (D)</p> Signup and view all the answers

What is the purpose of the installation phase in the cyber kill chain?

<p>To create back doors and additional channels (D)</p> Signup and view all the answers

What is the last phase of the cyber kill chain?

<p>Actions on objectives (D)</p> Signup and view all the answers

What is the primary purpose of the cyber kill chain model?

<p>To understand the results of an attack (D)</p> Signup and view all the answers

Which of the following is NOT a phase of the cyber kill chain?

<p>Exploitation (A)</p> Signup and view all the answers

What is the primary focus of the reconnaissance process in the context of security?

<p>Scanning IP blocks or performing vulnerability scans (D)</p> Signup and view all the answers

What is the main goal of the Diamond Model of intrusion analysis?

<p>To analyze the intrusions that have occurred in an environment (B)</p> Signup and view all the answers

What is an example of a capability in the context of the Diamond Model?

<p>Malware or a hacker tool used to exploit a system (B)</p> Signup and view all the answers

What is the purpose of the detection techniques and references provided in the framework?

<p>To detect specific types of attacks and understand how to mitigate them (A)</p> Signup and view all the answers

What is credential stuffing in the context of a brute force attack?

<p>A way of using stolen credentials to gain access to a system (B)</p> Signup and view all the answers

What is the main benefit of using the framework described in the text?

<p>It offers a wealth of information on different types of attacks and how to prevent them (C)</p> Signup and view all the answers

What is the relationship between the adversary and the infrastructure in the Diamond Model?

<p>The adversary uses the infrastructure to gain access (D)</p> Signup and view all the answers

What is the purpose of the mitigation strategies provided in the framework?

<p>To help users develop strategies for preventing specific types of attacks (C)</p> Signup and view all the answers

What is the main difference between reconnaissance and a brute force attack?

<p>Reconnaissance is a pre-compromise mitigation process, while a brute force attack is a type of attack (D)</p> Signup and view all the answers

What is the main benefit of using the Diamond Model of intrusion analysis?

<p>It helps users understand the intrusions that have occurred in an environment (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser