Threat Vectors & Attack Surfaces

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

An attack surface is the sum of all the potential points (vulnerabilities) through which an attacker can interact with or compromise a system or network, indicating the overall exposure to potential threats. Examples of attack surfaces can be all software, hardware, and network interfaces with known security flaws. A threat vector represents the method or means through which a cyber threat is introduced or delivered to a target system. It outlines the pathway or avenue used by attackers to exploit vulnerabilities. Common threat vector types include phishing emails, malware, drive-by downloads, and social engineering techniques.

True

2
New cards

Which of the answers listed below refers to an email-based threat vector?

  • Spoofing

  • Phishing

  • BEC attacks

  • Malicious link

  • Malware attachments

3
New cards

Which of the following terms refers to a threat vector commonly associated with SMS-based communication?

Smishing 

4
New cards

Which of the answers listed below refers to an example of a potential threat vector in IM-based communication?

  •  Phishing attack

  •    Malware distribution

  •    Spoofing attack

  •    Eavesdropping

  •    Account hijacking

  •    Malicious link/attachment

5
New cards

Which of the answers listed below refers to an example of a potential threat vector in IM-based communication?

  •   Phishing attack

    •    Malware distribution

    •    Spoofing attack

    •    Eavesdropping

    •    Account hijacking

    •    Malicious link/attachment

6
New cards

Which of the following answers refer to examples of image-based threat vectors? (Select 3 answers)

  • Steganography

  • Image spoofing (deepfakes)

  • Malware-embedded images

7
New cards

Which of the answers listed below refers to a file-based threat vector?

  • PDF exploits

  •    Malicious macros in documents

  •    Compressed files (ZIP, RAR)

  •    Malicious scripts in web pages

  •    Infected images

  •    Malicious executables

8
New cards

Which of the following answer choices is an example of a threat vector type that is typical for voice communication?

Vishing

9
New cards

Examples of threat vectors directly related to the use of removable devices include: (Select 2 answers)

  • Malware delivery

  • Data exfiltration

10
New cards

Which of the answers listed below refer(s) to client-based software threat vector(s)? (Select all that apply)

  • Drive-by download via web browser

  • Malicious macro

  • USB-based attack

  • Infected executable file

  • Malicious attachment in email application

11
New cards

Which of the following answers refer to agentless software threat vectors? (Select 2 answers)

  • Network protocol vulnerability

  • Packet sniffing

12
New cards

Exploiting known vulnerability is a common threat vector for:

Unsupported systems/apps

13
New cards

Which of the wireless technologies listed below are considered potential threat vectors and should be avoided due to their known vulnerabilities? (Select all that apply)

  • WPS

  • WPA

  • WPA2

  • WEP

14
New cards

Which of the following answers refers to a threat vector characteristic only to wired networks?

Cable tapping

15
New cards

Examples of threat vectors related to Bluetooth communication include: bluesmacking (a type of DoS attack that targets Bluetooth devices by overwhelming them with excessive traffic), bluejacking (the practice of sending unsolicited messages or data to a Bluetooth-enabled device), bluesnarfing (gaining unauthorized access to a Bluetooth device and data theft), and bluebugging (gaining remote control over a Bluetooth device).

True

16
New cards

Which of the answers listed below refers to the most probable cause of an unauthorized access caused by the exploitation of a specific network entry point?

Open service ports

17
New cards

The importance of changing default usernames and passwords can be illustrated by the example of certain network devices (such as routers), which are often shipped with default and well-known admin credentials that can be looked up on the web. Leaving the default credentials unchanged expands the attack surface by providing an easy entry point for unauthorized access.

True

18
New cards

Which of the following answers refer to common threat vectors that apply to MSPs, vendors, and suppliers in the supply chain?

  • Propagation of malware

  • Social engineering techniques