1_5_1 Section 1 – Attacks, Threats, and Vulnerabilities - 1.5 – Threat Actors and Vectors - Threat Actors
52 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Who are the insiders that have a lot of control and reign over what they can do inside of a network?

  • Nation states
  • Script Kiddies
  • Hacktivists
  • Employers or contractors (correct)
  • What is the advantage that an insider has over an external attacker?

  • They are more skilled
  • They are more motivated
  • They have more resources
  • They know the internal network and systems (correct)
  • What is a nation state in the context of threat actors?

  • A type of malware
  • A government entity (correct)
  • A group of hackers
  • A group of activists
  • What is the goal of a hacktivist?

    <p>To send a political or social message (A)</p> Signup and view all the answers

    What is a Script Kiddie?

    <p>Someone who uses simple scripts to gain access (B)</p> Signup and view all the answers

    What motivates a Script Kiddie?

    <p>To prove their skills (A)</p> Signup and view all the answers

    What is organized crime in the context of threat actors?

    <p>A set of professional criminals (B)</p> Signup and view all the answers

    What is an example of a nation state being a threat entity?

    <p>The United States and Israel team together (B)</p> Signup and view all the answers

    What is the goal of a nation state entity?

    <p>To gain access to equipment or destroy it (A)</p> Signup and view all the answers

    What is the difference between a hacktivist and a Script Kiddie?

    <p>One is focused on a single message, the other is not (D)</p> Signup and view all the answers

    What motivates most threat actors who engage in hacking?

    <p>To gain financial benefits (C)</p> Signup and view all the answers

    What is the structure of a threat actor group like?

    <p>Similar to a normal business with different roles (D)</p> Signup and view all the answers

    What is the definition of a hacker?

    <p>An expert with technology, regardless of intentions (C)</p> Signup and view all the answers

    What is the role of an ethical hacker?

    <p>To find vulnerabilities and help resolve them (D)</p> Signup and view all the answers

    Who is a semi-authorized hacker?

    <p>A hacker who is looking for vulnerabilities but doesn't act on them (C)</p> Signup and view all the answers

    What is a shadow IT department?

    <p>A separate IT entity that bypasses the IT department (D)</p> Signup and view all the answers

    What is a disadvantage of having a shadow IT department?

    <p>May lead to compliance issues and security risks (D)</p> Signup and view all the answers

    What is a motivation for competitors to engage in hacking?

    <p>To cause harm to their competitors (D)</p> Signup and view all the answers

    What is a characteristic of a threat actor who engages in hacking for financial gain?

    <p>They usually have significant financial resources (D)</p> Signup and view all the answers

    What is the goal of a threat actor who engages in espionage?

    <p>To gain access to sensitive information (D)</p> Signup and view all the answers

    What is the primary goal of a threat actor?

    <p>To gain unauthorized access to a network (B)</p> Signup and view all the answers

    What is an Advanced Persistent Threat (APT)?

    <p>A threat that can get into a network and remain undetected for a long time (B)</p> Signup and view all the answers

    What is the average time it takes for threat actors to be detected in North and South America?

    <p>71 days (B)</p> Signup and view all the answers

    Which of the following is a characteristic of a threat actor who has infiltrated a network?

    <p>They are able to remain undetected for a long time (A)</p> Signup and view all the answers

    Why are insiders who are threat actors particularly dangerous?

    <p>They have already infiltrated the network (C)</p> Signup and view all the answers

    What is the general term used to describe an entity responsible for an event that has an impact on the safety of another entity?

    <p>Threat actor (B)</p> Signup and view all the answers

    What is the primary advantage of an insider threat actor over an external attacker?

    <p>They have knowledge of the network's design and security tools (C)</p> Signup and view all the answers

    What is the primary goal of a hacktivist?

    <p>To send a political or social message (D)</p> Signup and view all the answers

    What is the characteristic of a Script Kiddie?

    <p>They use simple scripts to gain access to networks (A)</p> Signup and view all the answers

    What is the primary characteristic of an organized crime group?

    <p>They are a group of professional criminals (C)</p> Signup and view all the answers

    What is the primary goal of a nation state entity?

    <p>National security (D)</p> Signup and view all the answers

    What is the advantage of a nation state entity over other threat actors?

    <p>They have access to highly skilled technologists and security experts (D)</p> Signup and view all the answers

    What is the primary motivation of a Script Kiddie?

    <p>To brag about their hacking abilities (D)</p> Signup and view all the answers

    What is the primary difference between a hacktivist and a Script Kiddie?

    <p>Their motivation (B)</p> Signup and view all the answers

    What is a common characteristic of a threat actor group that engages in hacking for financial gain?

    <p>They are structured like a typical business with different roles. (B)</p> Signup and view all the answers

    What is the primary characteristic of an insider threat actor?

    <p>They have a lot of control and reign over what they can do inside of the network (C)</p> Signup and view all the answers

    What is the primary goal of a malicious hacker?

    <p>To gain access to a network and cause mayhem. (C)</p> Signup and view all the answers

    What is the primary goal of an organized crime group in the context of hacking?

    <p>To Financial gain (B)</p> Signup and view all the answers

    What is a potential risk of creating a shadow IT department?

    <p>It can create security risks and compliance issues. (B)</p> Signup and view all the answers

    What motivates a competitor to engage in hacking against a business?

    <p>A desire to gain a competitive advantage. (B)</p> Signup and view all the answers

    What is the primary difference between an ethical hacker and a malicious hacker?

    <p>The permission they have to hack. (A)</p> Signup and view all the answers

    What is a characteristic of a semi-authorized hacker?

    <p>They look for vulnerabilities without taking advantage of them. (B)</p> Signup and view all the answers

    What is the benefit of having an ethical hacker?

    <p>They can help improve security and find weak points. (A)</p> Signup and view all the answers

    What is the typical structure of a threat actor group that engages in hacking for financial gain?

    <p>A structured organization with different roles. (A)</p> Signup and view all the answers

    What is a potential consequence of having a shadow IT department?

    <p>Internal infighting and dysfunction. (C)</p> Signup and view all the answers

    What is the motivation of a threat actor who engages in hacking for financial gain?

    <p>A desire to make a financial gain. (B)</p> Signup and view all the answers

    What is the primary goal of an advanced persistent threat (APT)?

    <p>To gain persistent access to sensitive data inside a network (C)</p> Signup and view all the answers

    What is the term used to describe an entity responsible for an event that has an impact on the safety of another entity?

    <p>Threat actor (B)</p> Signup and view all the answers

    According to a FireEye report, what is the average time it takes to detect an undetected attacker in North and South America?

    <p>71 days (D)</p> Signup and view all the answers

    What is the primary characteristic of an advanced threat?

    <p>It is a targeted attack that uses advanced techniques (D)</p> Signup and view all the answers

    Which type of threat actor is considered particularly dangerous?

    <p>Insider threats (D)</p> Signup and view all the answers

    What is the primary motivation of a threat actor?

    <p>To gain financial benefits (A)</p> Signup and view all the answers

    More Like This

    Types of Malicious Software (Malware)
    5 questions
    Cybersecurity Threat Actors Overview
    10 questions
    Use Quizgecko on...
    Browser
    Browser