Chapter 6

What is one way to minimize the effectiveness of social engineering attacks?

Teaching users about social engineering tactics and underlying principles

What is the potential risk associated with opening a malicious attachment associated with invoice scams?

The user’s system might get infected with ransomware or other malware

What is the primary goal of a watering hole attack?

To infect a trusted website with malware and target its visitors

What is one way to thwart keyloggers as discussed in the text?

Using two-factor authentication (2FA)

What is the purpose of the Trusted Automated eXchange of Indicator Information (TAXII)?

Defines a set of services and message exchanges used to share information

The Trusted Automated eXchange of Indicator Information (TAXII) is an open standard that defines a set of services and message exchanges used to share information. It provides a standard way for organizations to exchange cyber threat information.

What is one reason an attacker might buy a domain name similar to a legitimate website, as discussed in the ’Earning ad revenue’ section?

To host pay-per-click ads

The text mentions that one reason attackers buy similar domains is to host pay-per-click ads. When visitors accidentally visit the site and click on these ads, advertisers pay revenue to the attacker.

What is the function of threat maps?

They provide a visual representation of active threats

What is the primary function of a beacon in an email phishing attack?

What does closed/proprietary intelligence refer to in the context of cybersecurity?

Which are some of the reported names for the APTs sponsored by the Iranian government?

What is the main purpose of a whaling attack?

What are some common types of open source intelligence (OSINT) utilized by penetration testers or attackers?

How do attackers use social media as an attack vector?

What is hybrid warfare?

Why do social engineers often attempt to build rapport with a victim before launching an attack?

What is the difference between identity theft and identity fraud based on the provided text?

What defines an Advanced Persistent Threat (APT) in the cyber security context?

Which of the following is usually a strong indicator of a system being part of a botnet?

What is one of the reasons an attacker might purchase a domain similar to a legitimate one?

What is phishing?

What is the role of a local industry group in the context of cybersecurity?

What are some effective methods to prevent shoulder surfing as mentioned in the text?

Criminal syndicates and Advanced Persistent Threats (APTs) are both types of organized cyber threat actors, but have different primary motivations. What are the chief motivations of these groups?

Which of the following best describes a ’Black Hat’ as discussed in the given text?

Which of the following best describes pretexting in the context of social engineering?

What is the classic Nigerian scam (also called a 419 scam) usually about?

Which of the following best describes the term ’Advanced Persistent Threat (APT)’?

Which of the following is NOT a common security control used to protect against malware according to the text?

Why is it important to verify information shared in social media groups before acting on it as a cybersecurity personnel?

What is the primary function of anti-malware software on mail gateways?

What can be a strong indicator of infection in a network regarding traffic to specific IPs?

What is a possible malicious intention for an attacker purchasing a domain similar to a legitimate one?

What is the Automated Indicator Sharing (AIS) used for?

What is NOT a common type of Open Source Intelligence (OSINT) as described in the text?

What is the main purpose of a backdoor?

What tactics are considered effective for a person to get others to comply through impersonation?

What is the primary motivation for criminal syndicates in the context of cyberattacks?

Which of the following is used by social engineers during elicitation to encourage a target to speak more ?

What is the importance of academic journals in cybersecurity?

Which types of attacks are most effective when exploiting authority?

Which of the following is NOT a technique used by fileless malware?

Which of the following is NOT a reported name for an APT sponsored by the Russian government?

What is the technique of vishing as used in cyber security?

Which of the following best describes a zero-day vulnerability based on the provided text?

What description is accurate regarding the threat actor referred to as a ’script kiddie’?

What is a characteristic of fileless malware?

What is the purpose of using a spam filter on mail gateways?

What is the primary risk associated with Shadow IT?

What does the term ’consensus’ refer to in the context of cyber threats?

What is an Advanced Persistent Threat (APT) typically characterized by?

What is the primary purpose of Cuckoo Sandbox?

Which of the following is a viable solution to prevent spear phishing attacks?

What is a key challenge when implementing spam filters?

According to the text, which of the following is NOT a method used by social engineers to gain unauthorized access or information?

According to the passage, which of the following is not a technique used by social engineers in the elicitation process?

What does data exfiltration refer to in the context of malware attacks?

Which of the following attacks are most likely to use urgency as a technique?

What does heuristic-based detection in antivirus software aim to detect?

Which of the following is NOT an indicator of a malware attack?

Which of the following correctly describes the Dark Web?

What is one possible reason an attacker might purchase a domain name similar to a legitimate one, according to the passage?

Why might encrypted traffic be considered an indicator of a malware attack?

Which of the following best describes a ’hacktivist’ as presented in the provided text?

Which of the following best describes Indicators of Compromise (IoC)?

Which of the following is NOT provided as a source for taking the assistance of cybersecurity personnel during threat research?

What is the primary purpose of a virus?

What is URL hijacking or typo squatting?

What type of cyber attack leverages the authority of legal entities to coerce executives into opening malicious attachments?

What term best describes the group of threat actors who are usually highly organized, funded by nation-states, and target specific organizations for long periods of time?

What is the technique called that attackers use by sending text messages to trick users into giving up personal information and uses the method of phishing?

What is the purpose of Trusted Automated eXchange of Indicator Information (TAXII)?

What is the purpose of reflective questioning in social engineering?

Which of the following is NOT a common security control used to protect against malware?

What is the primary purpose of dumpster diving in the context of cybersecurity?

What is the purpose of using file integrity monitors in antivirus scanners?

What is the impact of Potentially unwanted programs (PUPs) on a user’s computer?

What is a common method attackers use to spread Trojans?

What can be expected when you opt out of email services from a legitimate company?

What is the primary purpose of a Request for Comments (RFC) published by the Internet Engineering Task Force (IETF)?

Which of the following is NOT an indicator of a malware-infected system based on the provided text?

What potential damage could serious virus hoaxes cause?

What is the purpose of ’active listening’ in the context of social engineering?

What is the goal of impersonation by social engineers according to the text?

What is the primary motivation for criminal syndicates in launching cyber attacks?

What is the classic method of credential harvesting used by attackers?

What technique do attackers often use along with malware?

Which of the following is NOT a typical indicator of a malware attack?

How do criminals impersonate your friends through email according to the text?

What is a common delivery method for a Remote Access Trojan (RAT)?

What is a logic bomb?

Which of the following methods is NOT used by fileless viruses?

What are some common types of Open Source Intelligence (OSINT)?

Which of the following best describes the main purpose of spyware?

Which of the following statements about cybersecurity conferences is true according to the text?

How does the concept of ’Scarcity’ apply to phishing and Trojan attacks?

Which one of the following statements elucidates the ’upgrade’ phishing technique?

What is a characteristic of an advanced persistent threat (APT)?

Who sponsors Advanced Persistent Threats (APTs) and what is their characteristic?

What is a significant challenge when encountering Spam over Internet Messaging (SPIM)?

What is the role of a ’Bot herder’ in a botnet?

Which of the following attack vectors is estimated to be the starting point of up to 91 percent of all attacks?

Which of the following best describes the primary difference between a worm and a virus?

What are attack vectors and how do attackers use them?

What security attack tactic involves combining intimidation with urgency and impersonation?

What is the technique called ’Bracketing’ that is used by social engineers?

What is the role of the Structured Threat Information eXpression (STIX) in open source intelligence (OSINT)?

According to the passage, how do social engineers try to gain the trust of their victims?`

Why are building rapport and likability important in the context of tailgating attacks?

What is an Advanced Persistent Threat (APT) typically understood to be in the context of cyber attacks?

What is one of the main benefits of Peer-to-Peer (P2P) botnets from the perspective of a cybercriminal?

What does the term ’gaslighting’ mean in the context of information security?

In the context of social engineering attacks, why is the principle of liking and rapport building effective in shoulder surfing?

What is hybrid warfare and how is it applied in influence campaigns?

What is the main difference between ransomware and cryptomalware?

How soon can an attacker typically begin lateral movement within a network after the initial infection?

What do rootkits use to modify system behavior and avoid detection?

What is a common use of file/code repositories in the realm of cybersecurity?

Which of the following resources is especially true for finding reliable information on vulnerabilities and patches used to fix them?

Which of the following strategies is commonly utilized to mitigate the risk of malware entering the network through network traffic?

What is the main motivation behind the cyber activities of criminal syndicates?

What is the role of InfraGard in the context of public/private information sharing centers?

What is ’vishing’ in the context of cyber security?

What does ’reconnaissance’ refer to within the context of social engineering?

What are the two common methods by which antivirus software detects viruses?

Which types of attacks can be launched via email according to the provided text?

What is Predictive analysis in the context of cybersecurity?

What is the primary function of signature files in antivirus software?

Which of the following is NOT a technique used by fileless malware?

Last updated