What tactical document associates a vulnerability with its associated target Quizlet

Lack of training: Untrained staff may be susceptible to malicious activity such as phishing emails and vishing phone calls

Show

    Data retention: Data backups are a preventative measure taken by most organizations. However, they can become unwieldy and difficult to maintain. Be sure to implement strong security measures for stored data.

    Unpatched systems: Systems may be vulnerable to known exploits when unpatched.

    Weak passwords: Threat actors have access to tables of many thousand common passwords. Users who utilize weak passwords make their systems vulnerable.

    Default credentials: Hardware and appliances often come with a default username and password. When the username and/or password is unchanged, attackers can easily gain access to network infrastructure.

    Open ports: Scanning tools used by threat actors will find any opening possible into a system or device. If open ports are not protected, attackers can gain access to a system.

    Default programs: Most systems come preconfigured to run default programs. Some of these programs may have known vulnerabilities that can be exploited.

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Terms in this set (99)

    What is the correct sequence of steps involved in scheduling a threat intelligence program? (Page 182)
    1. Review the project charter
    2. Identify all deliverables
    3. Identify the sequence of activities
    4. Identify task dependencies
    5. Develop the final schedule
    6. Estimate duration of each activity
    7. Identify and estimate resources for all activities
    8. Define all activities
    9. Build a work breakdown structure (WBS)
    A. 1, 2, 3, 4, 5 ,6 ,7 ,8 , 9
    B. 1, 2, 3, 4, 5, 6, 9, 8, 7
    C. 1, 9, 2, 8, 3, 7, 4, 6, 5
    D. 3, 4, 5, 2, 1, 9, 8, 7, 6

    Jim works as a security analyst in a large multinational company. Recently, a group of hackers penetrated into their organizational network and used a data staging technique to collect sensitive data. They collected all sorts of sensitive data about the employees and customers, business tactics of the organization, financial information, network infrastructure information, and so on.
    What should Jim do to detect the data staging before the hackers exfiltrate from the network? (Page 116)
    A. Jim should analyze malicious DNS requests, DNS payload, unspecified domains, and destination of DNS requests.
    B. Jim should identify the web shell running in the network by analyzing server access, error logs, suspicious strings indicating encoding, user agent strings, and so on.
    C. Jim should monitor network traffic for malicious file transfers, file integrity monitoring, and event logs.
    D. Jim should identify the attack at an initial stage by checking the content of the user agent field.

    Walter and Sons Company has faced major cyber attacks and lost confidential data. The company has decided to concentrate more on the security rather than other resources. Therefore, they hired Alice, a threat analyst, to perform data analysis. Alice was asked to perform qualitative data analysis to extract useful information from collected bulk data.
    Which of the following techniques will help Alice to perform qualitative data analysis? (Page 406)
    A. Brainstorming, interviewing, SWOT analysis, Delphi technique, and so on
    B. Regression analysis, variance analysis, and so on
    C. Finding links between data and discover threat-related information
    D. Numerical calculations, statistical modeling, measurement, research, and so on

    An organization suffered many major attacks and lost critical information, such as employee records, and financial information. Therefore, the management decides to hire a threat analyst to extract the strategic threat intelligence that provides high-level information regarding current cyber-security posture, threats, details on the financial impact of various cyber-activities, and so on.
    Which of the following sources will help the analyst to collect the required intelligence? (Page 26)
    A. OSINT, CTI vendors, ISAO/lSACs
    B. Campaign reports, malware, incident reports, attack group reports, human intelligence
    C. Humans, social media, chat rooms
    D. Active campaigns, attacks on other organizations, data feeds from external third parties

    Sets with similar terms

    Other sets by this creator

    Recommended textbook solutions

    What tactical document associates a vulnerability with its associated target Quizlet

    What tactical document associates a vulnerability with its associated target Quizlet

    What tactical document associates a vulnerability with its associated target Quizlet

    What tactical document associates a vulnerability with its associated target Quizlet

    Other Quizlet sets