1/19
Threat actors and motivations/Threat vectors and attack surfaces
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which threat category is most likely to steak a major multinational corporation’s confidential trade secrets for the benefit of a competing company?
Organized crime
A cyber attacker gains access to an organization’s sensitive customer information and threatens to expose it unless a substantial sum of money is paid. What category of cyber threat does this scenario represent? Select the BEST option.
Blackmail
Which of the following attributes of threat actors defines their operational capacity with respect to their reach and effectiveness?
Resources/ funding
What is the primary distinction between a hacktivist and an insider threat? Select the BEST option.
Hacktivists promote causes through cyber campaigns, while insider threats misuse access within an organization
What is the primary method cybercriminals use to steal sensitive data and sell it on the black market to generate monetary gains?
Data exfiltration
An individual without a lot of experience in IT launches a cyberattack, using readily available tools to disrupt a local government website temporarily. Which threat actor category does this scenario best align with?
An unskilled attacker
Employees in a company start using a cloud storage service without authorization, bypassing official IT protocols. What term best describes this situation?
Shadow IT
Which threat actor category is likely to launch a cyber operation to disrupt the critical infrastructure of a rival as part of a geopolitical conflict? Select the BEST option.
A nation-state
Nation-state engage in cyber operations to disrupt critical infrastructure and gather intelligence for geopolitical purposes. What action does this activity primarily represent?
Espionage
A former employee, who was terminated, hacks into a company’s database delete critical customer records to disrupt business operations because of a lasting grievance around their termination. What category of motivation does this scenario exemplify?
Revenge
You receive an email claiming to be from the IRS (Internal Revenue Service) informing you of a tax refund. The email contains a link to a website where you can claim the refund by providing your personal and financial information. You provide this information, but an hour later your bank account has been emptied. What type of attack is this most likely to be?
Phishing
You are working for a government agency and have been tasked with sending data to a field operative. You decide to hide a secret message inside a pretty picture that you attach to a digitally signed email. What is the technique adopted by you called?
Steganography
A CEO’s phone was hacked while they were on holiday. Which of the following is the MOST LIKELY Bluetooth attack vector that could have been used to gain access?
Pairing with a public Bluetooth headset
What distinguishes spear phishing from regular phishing?
Spear phishing targets high-profile individuals, while regular phishing targets a broader audience
You come across a website offering free software downloads and download a program from it. Later, you realize that your computer is behaving strangely, and you suspect a malware infection. What kind of threat might you have encountered?
A Trojan disguised as the downloaded software
Recently, your company suffered data theft from company-owned mobile telephones. You are a cybersecurity administrator and have been tasked with protecting the data stored on company mobile phones. Which of the following can be used to protect data stored on mobile telephones? Select the BEST TWO.
Strong passwords/Screen locks
In the last month, there has been a rise in the number of watering hole attacks. Which of the following BEST describes the goals of a watering hole attack?
Compromising a frequently visited website to infect its visitors with malware
Which of the following is a distinguishing feature of a business email compromise (BEC) attack?
The attacker poses as a legitimate brand or organization
A company executive was researching cloud computing. The executive typed www.microsooft.com into their web browser to get to the Microsoft home page but was redirected to a website with a slightly different home page than expected. What type of attack is this?
Typosquatting
Which of the following scenarios best describes the concept of disinformation?
Alex creates a social media account to impersonate a celebrity