Understanding Cyber Threat Actors and Attack Vectors

VisionaryPulsar avatar
VisionaryPulsar
·
·
Download

Start Quiz

Study Flashcards

29 Questions

What is the term used to describe an individual or group that poses a threat to cybersecurity?

Cyber threat actor

What is the primary motivation of black hat hackers?

Financial gain

What is the attack vector in a cyber attack?

The path and tool used by a malicious threat actor to intrude a computer system

What is a characteristic of black hat organizations?

They have call centers to make outbound calls

What do black hat hackers sometimes try to convince victims to do?

Allow remote access to their computers

What is a way to categorize threat actors?

By their motivation, type of attack, and targeted sector

What is the primary objective of penetration testing?

To identify vulnerabilities and weaknesses in an organization's defenses

What is the purpose of reconnaissance and research in penetration testing?

To identify ways to legally bypass security controls and mechanisms

What do white hat hackers create to distract cybercriminals?

Honeypots

What is the purpose of a honeypot?

To mimic a target for hackers and gain information about cybercriminals

What do gray hat hackers often do?

Look for vulnerabilities in a system without the owner's permission

What do gray hat hackers sometimes do after finding issues?

Report the issues to the owner for a small fee

What is the purpose of Nmap's port scan?

To determine which services a host is running

What is theHarvester used for?

To gather open-source intelligence (OSINT) for a particular domain or company

What is the purpose of the nslookup command?

To query internet domain name servers

What is the main goal of service discovery?

To determine which services each host is running

What is Nmap Netstat used for?

To show the state of TCP/UDP ports on the local machine

What does Dnsenum do?

Packages a number of DNS tests into a single query

What is a primary goal of an attacker using a rootkit?

To gain remote control and administration-level access over a system

Why are IoT attacks becoming more popular?

Due to the rapid growth of IoT devices and low priority given to embedded security

What is a common result of a rootkit attack?

Data theft

What type of access can an attacker gain using a rootkit?

Administration-level access

What is a common target of IoT attacks?

Low-security devices

What is the primary goal of threat hunting in a network?

To proactively search for undetected cyber threats

What is the primary purpose of a penetration testing process?

To test the efficiency of security measures in place

What is the role of the red team in a red team/blue team exercise?

To try to attack an organization's cybersecurity defenses

What is the main difference between social engineering and technical hacking?

Social engineering uses human nature, while technical hacking uses technical skills

What is the final phase of the penetration testing process?

Final analysis and report

What is the primary goal of a blue team in a red team/blue team exercise?

To defend against and respond to the red team's attack

Test your knowledge of cyber threat actors, including their motivations, types of attacks, and targeted sectors. Learn about the paths and tools used to intrude computer systems and more.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser