Live Virtual Machine Lab 1.2: Module 01 Gathering Intelligence on Threat Actors and Vectors
Which of the following are the phases in Open Source Intelligence (OSINT)?
All the Above, Result Delivery Data Analysis, Data Processing, Data Harvesting, Source Identification
USB drive Digital Photo frame
In the year 2008, which of the digital devices was a carrier of the virus in the supply chain environment? [Choose all that apply]
TRUE
Insider threats are generated by the individuals who are either the organization's employees or are closely associated with the organization as a vendor or a third-party. [TRUE/FALSE]
Hacktivists
Which of the following performs hacking for either a political reason or wants to bring in a social change?
Advanced Persistent Threat (APT)
Which of the following type of attacker keeps exfiltrating the data quietly, without being detected?
Black Hat
Which type of hackers break into systems for personal or financial gain?