chapter 5/6 (Domain 2) 22%

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Threat actors and motivations/Threat vectors and attack surfaces

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Which threat category is most likely to steak a major multinational corporation’s confidential trade secrets for the benefit of a competing company?

Organized crime

2
New cards

A cyber attacker gains access to an organization’s sensitive customer information and threatens to expose it unless a substantial sum of money is paid. What category of cyber threat does this scenario represent? Select the BEST option.

Blackmail

3
New cards

Which of the following attributes of threat actors defines their operational capacity with respect to their reach and effectiveness?

Resources/ funding

4
New cards

What is the primary distinction between a hacktivist and an insider threat? Select the BEST option.

Hacktivists promote causes through cyber campaigns, while insider threats misuse access within an organization

5
New cards

What is the primary method cybercriminals use to steal sensitive data and sell it on the black market to generate monetary gains?

Data exfiltration

6
New cards

An individual without a lot of experience in IT launches a cyberattack, using readily available tools to disrupt a local government website temporarily. Which threat actor category does this scenario best align with?

An unskilled attacker

7
New cards

Employees in a company start using a cloud storage service without authorization, bypassing official IT protocols. What term best describes this situation?

Shadow IT

8
New cards

Which threat actor category is likely to launch a cyber operation to disrupt the critical infrastructure of a rival as part of a geopolitical conflict? Select the BEST option.

A nation-state

9
New cards

Nation-state engage in cyber operations to disrupt critical infrastructure and gather intelligence for geopolitical purposes. What action does this activity primarily represent?

Espionage

10
New cards

A former employee, who was terminated, hacks into a company’s database delete critical customer records to disrupt business operations because of a lasting grievance around their termination. What category of motivation does this scenario exemplify?

Revenge

11
New cards

You receive an email claiming to be from the IRS (Internal Revenue Service) informing you of a tax refund. The email contains a link to a website where you can claim the refund by providing your personal and financial information. You provide this information, but an hour later your bank account has been emptied. What type of attack is this most likely to be?

Phishing

12
New cards

You are working for a government agency and have been tasked with sending data to a field operative. You decide to hide a secret message inside a pretty picture that you attach to a digitally signed email. What is the technique adopted by you called?

Steganography

13
New cards

A CEO’s phone was hacked while they were on holiday. Which of the following is the MOST LIKELY Bluetooth attack vector that could have been used to gain access?

Pairing with a public Bluetooth headset

14
New cards

What distinguishes spear phishing from regular phishing?

Spear phishing targets high-profile individuals, while regular phishing targets a broader audience

15
New cards

You come across a website offering free software downloads and download a program from it. Later, you realize that your computer is behaving strangely, and you suspect a malware infection. What kind of threat might you have encountered?

A Trojan disguised as the downloaded software

16
New cards

Recently, your company suffered data theft from company-owned mobile telephones. You are a cybersecurity administrator and have been tasked with protecting the data stored on company mobile phones. Which of the following can be used to protect data stored on mobile telephones? Select the BEST TWO.

Strong passwords/Screen locks

17
New cards

In the last month, there has been a rise in the number of watering hole attacks. Which of the following BEST describes the goals of a watering hole attack?

Compromising a frequently visited website to infect its visitors with malware

18
New cards

Which of the following is a distinguishing feature of a business email compromise (BEC) attack?

The attacker poses as a legitimate brand or organization

19
New cards

A company executive was researching cloud computing. The executive typed www.microsooft.com into their web browser to get to the Microsoft home page but was redirected to a website with a slightly different home page than expected. What type of attack is this?

Typosquatting

20
New cards

Which of the following scenarios best describes the concept of disinformation?

Alex creates a social media account to impersonate a celebrity