Ch.1 threat and Vulnerability Mgmt

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Some of the unintentional activities that insiders may perform are:

-Accidental data deletion -Accidental data modification -Incorrect usage of privileges

who are the 5 most important groups to disseminate threat intelligence data to?

-Incident response -Vulnerability management -Detection and monitoring -security engineering -Risk management

While conducting APTs, which of the following types of information are looked at?(Choose all that apply) -Any and all data -Intellectual property (IP) secrets -Design -Critical business information

-Intellectual property (IP) secrets -Design -Critical business information

Which of the following options are the main sources of technology-based threats?(Choose all that apply) -Internet -Exploitation -Email -Removable media

-Internet -Email -Removable media

Which of the following options are technical constraints while running a vulnerability scan?(Choose all that apply) -Time of the scan -Availability of resources or assets -Licensing restrictions -Several target assets

-Licensing restrictions -Several target assets -Time of the scan Explanation: When running a vulnerability scan, there can be several technical constraints. Some key constraints are: Licensing restrictions: Depending on the type of product that you are using, you may have restrictions on running several scans per day or within a given period. Several target assets: There may be a limitation on the number of target assets that you can scan simultaneously. Availability of resources or assets: There can be a possibility that a certain set of assets or resources are not available at the time of the scan. For example, a live Web server may not be available for scanning.

What is the process that APTs follow?

-Recon: Define and research targets -Intrusion: Complete the initial intrusion - Compromise user credentials - Move laterally -Persistence: Stay low profile and build persistence -Exfiltrate data -Cover tracks

Which of the following options are key pillars of intelligence/information gathering? (Choose all that apply) -Relevance -Completeness -Accuracy -Timeliness

-Relevance -Completeness -Accuracy -Timeliness

Which of the following options are different phases of open-source intelligence? (Choose all that apply) -Result Delivery -Source Identification -Business Information Gathering -Data Harvesting

-Source Identification -Business Information Gathering -Data Harvesting

Which of the following options are serious issues caused by organized crime?(Choose all that apply) -Stealing industrial secrets and confidential organizational information -Extorting money using ransomware -Stealing intellectual property -Automated exploit kits

-Stealing industrial secrets and confidential organizational information -Extorting money using ransomware -Stealing intellectual property

Which of the following steps defines scope? (Choose all that apply) -Time of the scan -The type of scan that you can perform -The assets that you can scan -Infrastructure -Filtering

-Time of the scan -The type of scan that you can perform -The assets that you can scan

Which of the following options are types of threats? (Choose all that apply) -Theft -Unintentional -Intentional -Natural

-Unintentional -Intentional -Natural

Which of the following is a vulnerability scan that performs an in-depth scan of applications and systems to locate the vulnerabilities? choose the Best answer. -Internal -credentialed scans -Discovery scan -External -noncredentialed scans -Assessment scan

-assessment scans *credentialed scans would not be wrong, but the question did not mention anything about authentication or credentials.

What is OpenIoC

A method that helps trace IoCs in a standardized way by pointing out unusual network activity

what is the difference between acquired and Augmented ability?

Acquired means the actor uses off-the-shelf tools (like commodity malware), while augmented tools come from advanced groups who create or customize existing toolsets

In which phase of the Lockheed cyber kill chain would the adversary typically collect and transfer data from target systems to a remote server under their control

Action on objectives aka exfiltration

an engineer is investigating a suspected compromise by correlating IoCs into attack patterns, the engineer is able to identify several TTPs. What type of activity is the engineer performing

Behavorial threat research

what 3 tools do organized criminals commonly use?

Botnets, Automated exploit kits, and cloud based services

Name 5 proprietary intelligence sources

Business information Legal Data Educational records Banking information Medical records

What are the 4 pillars of intel gathering?

CART : Completeness, Accuracy, timeliness, and relevancy

Which of the following options are different characteristics of the diamond model?(Choose all that apply) Capacity Capabilities Victim Adversary

Capabilities Victim Adversary

Which of the following is a vulnerability scan that scans at the surface level to discover if assets exist on the network? -Internal -credentialed scans -Discovery scan -External -noncredentialed scans -Assessment scan

Discovery scans

What are ISACs and what do they do?

ISACs (Information sharing and analysis communities) protect the critical infrastructure of multiple industries.

Which type of insider is someone who has a relationship with an employee? -Pure insiders -Insider associates -Insider Affiliates -Outsider Affiliates

Insider Affiliate

which of the following uses both file format and the CTI version using STIX/TAXII -OpenIOC -MISP -IBM x-force exchange

MISP

Which of the following uses SNMP to create graphs showing traffic flows through network interfaces of routers and switches? -MRTG -Netflow -Zeek(Bro) -Netstat

MRTG

Name the 4 main things that a threat actor would look for in their analysis of a closed intelligence source and describe them

Marketing Strategies Manufacturing info: including future product info, formulas, or methods of production Financial info: including financial statements and order pipelines Research and Development: includes the research info on a product that is in beta

_____ reports metadata about network traffic, rather than capturing actual traffic. This data is often sampled. -MRTG -Netflow -Zeek(Bro) -Netstat

Netflow

which of the following publishes intel on GitHub in XML format? -OpenIOC -MISP -IBM -TAXII

OpenIOC

Which type of insider is an external entity that is not an employee and has no relationship with an employee. -Pure insiders -Insider associates -Insider Affiliates -Outsider Affiliates

Outsider affiliate

Simply list the different types of insiders

Pure insiders Insider associates Insider Affiliates Outsider Affiliates

What does STIX stand for and what is its main purpose

STIX (Structured Threat Information eXpression) is an expressive, extensible, human-readable, and automatable language primarily used to gather cyber threat information

Which of the following is a type of vulnerability scanner that pulls information from the system? -Internal -Server-based -Discovery based -External -Agent-based -Assessment based

Server-based

name 3 sources of OSINT

Social media, WHOIS repositories, search engines, etc

What does TAXII stand for and what is its main purpose

TAXII (Trusted automated exchange of indicator information) is a free method of sharing threat information in an automated way

what are the 3 different types of threats and their subsets?

Technological: Internet, E-Mail, Sofware vulnerability, and removable media Human: Intentional (deliberate) unintentional (inadvertently) Disaster: Man-made and Natural

Which type of insider is not directly a part of the organization but a third-party vendor or contractor with limited access to the company's resources? -Pure insiders -Insider associates -Insider Affiliates -Outsider Affiliates

The Insider Associate

Which type of insider is a legitimate user of the organization and is capable of causing the most damage? -Pure insiders -Insider associates -Insider Affiliates -Outsider Affiliates

The Pure insider

List the 7 different confidence levels

Unknown: 0% (has not been assessed as a threat) Discredited: 1% (possesses no threat) Improbable: 2-29% Doubtful: 30-49% Possible: 50-69% Probable: 70-99% Confirmed: 100%

which adversary characteristic describes actors that are able to exploit zero days and have both human and financial resources? -Developed -Advanced -Integrated -Acquired

a Developed adversary

what are the four basic categories of the diamond model?

adversary victim infrastructure capability

Which of the following options are common hurdles in vulnerability scanning activities?(Choose all that apply) -Network Bandwidth Consumption -Operational Schedules -Business Process Interruption -Correct Scoping

all of the above

which of the following is a method of sharing CTI data? (Choose all that apply) -OpenIOC -MISP -IBM

all of the above

which adversary characteristic describes actors that can exploit supply chains and compromise proprietary products to exploit service providers -Developed -Advanced -Integrated -Augmented

an advanced adversary

which adversary characteristic describes actors that can use non-cyber tools to exploit such as military or political assets -Developed -Advanced -Integrated -Acquired

an integrated adversary

True or false: STIX is an application that has been developed by the community to provide cyber threat information.

false It collects it, it does not provide it

What are threat vectors

processes, methods, or tools used by threat actors

what are the 5 phases of OSINT? describe them

source identification: ID sources for info gathering Data harvesting: collect data from sources Data processing: Filter out information that can help enumerate the target Data analysis: analyze the processed data Result delivery: information about the target is finalized

True or false: A threat is something that can potentially take advantage of a vulnerability to gain an advantage in altering, modifying, or deleting data and information.

true


Set pelajaran terkait

Principles of Leadership and Management

View Set

APUSH: Give Me Liberty Chapter 15 Notes (Reconstruction) (1865-1877)

View Set

Othello Test Review, Othello Act 3, Othello Act 2, Othello Act 1 (scenes: 1, 2, 3)

View Set