Thanks for Visiting my channel
Quiz - The Threat Landscape
Module 2: The Threat Landscape Quiz Answers
Which definition best represents the Cyber Kill Chain?
Chronicles the chain reaction of a cyber attack
Details how to respond at each stage of a cyber attack
Describes the stages of a cyber attack
Illustrates how a cyber attack is killed
Which bad actor type is motivated by notoriety?
Explorer
Cyber terrorist
Cybercriminal
Adventurer
Which bad actor type is motivated by ideology?
Hacktivist
Cyber ideologue
Cyber warrior
Explorer
Which system or organization assigns a severity score to help you identify the most dangerous cyberthreats to your organization?
Federal Bureau of Investigation (FBI)
Cyberthreat rating system unanimous (CRSU)
National Institute of Standards and Technology (NIST)
Common vulnerability scoring system (CVSS)
Which standard develops a common language for cyberthreat information?
Structured threat information expression (STIX)
MITRE ATT&CK
Common vulnerability scoring system (CVSS)
Cyberthreats vernacular (CTV)
Which two attack vector categories characterize a ransomware attack? (Choose two.)
Computer technology
Pre-exploit
Post-exploit
Human
What are the two ingredients of a successful social engineering attack? (Choose two.)
Gaining the trust of the victim
Denying the victim access to a server or service
Compelling the victim to act, such as instilling a sense of urgency
Stealing the victim’s credentials by watching them as they log in
Breaching the victim’s computer by exploiting a weakness in an application
Which step is the final action in the threat intelligence process?
Identifying which threats must be mitigated
Providing feedback and a review of lessons learned
Eliminating threats
Disseminating threat information
Which expression would best qualify as threat intelligence?
A list of malicious IP addresses and domain names
Security implications and actionable advice
News of a cyberattack on another organization’s network
Data feeds from a Security Information and Event Manager (SIEM)
Which bad actor type prefers ransomware as an attack method?
Cyber extortionist
Cyber terrorist
Cybercriminal
Cyber warrior
What is a benefit of using MITRE ATT@CK?
Provides a common taxonomy for understanding and mitigating cyberattacks
Supplies superior services at a lower cost than its competitors
Presents more cyber attack details than other methods, such as Cyber Kill Chain
Offers off-the-shelf security software solutions
Which sequence of a Cyber Kill Chain show the events occurring in the correct order?
Reconnaissance, delivery, weaponization, exploitation, installation, command and control, exfiltration
Weaponization, reconnaissance, delivery, exploitation, installation, command and control, exfiltration
Weaponization, reconnaissance, delivery, installation, exploitation, command and control, exfiltration
Reconnaissance, weaponization, delivery, exploitation, installation, command and control, exfiltration
Manipulating people to do something contrary to their interests is an example of which cybersecurity threat category?
Malware
System design failure
Social engineering
Unauthorized access
Which three requisite qualities must information have for it to be threat intelligence? (Choose three.)
Detailed
Contextual
Actionable
Timely
Relevant
Which cybersecurity threat category would a trojan horse be an example of?
Malware
Unauthorized access
Social engineering
System design failure
Which hacker type is someone employed by a computer security consulting firm who could be hired to do penetration testing?
Green hat
Black hat
Grey hat
Blue hat
No comments:
Post a Comment