Chapter 8 Questions Flashcards

(15 cards)

1
Q

What happens during reconnaissance?

A. Installing malware
B. Gathering information
C. Executing payload
D. Exfiltration

A

Answer: B

Explanation:
Reconnaissance is the first stage where the attacker gathers information about the target. This may include OSINT, scanning, and identifying vulnerabilities to prepare for the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of Command & Control?

A. Encrypt data
B. Communicate with attacker
C. Delete logs
D. Install malware

A

Answer: B

Explanation:
Command and Control (C2) is the communication channel between the attacker and the compromised system. It allows the attacker to send commands, control the system, and maintain access using protocols like HTTP or DNS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

First kill chain stage?

A. Delivery
B. Reconnaissance
C. Exploitation
D. Installation

A

Answer: B

Explanation:
Reconnaissance is the first stage where attackers gather information about the target. This includes OSINT, scanning, and identifying vulnerabilities. It helps attackers plan their attack strategy effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Weaponization involves:

A. Logs
B. Payload creation
C. Detection
D. Backup

A

Answer: B

Explanation:
Weaponization is the stage where attackers combine malware and an exploit into a payload. This payload is designed to exploit a vulnerability on the target system when delivered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Delivery example?

A. Encryption
B. Phishing email
C. Logging
D. Backup

A

Answer: B

Explanation:
Delivery is how the payload reaches the victim. Common methods include phishing emails, malicious websites, and infected USB devices. This stage is critical for initiating the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exploitation involves:

A. Data theft
B. Using vulnerability
C. Recovery
D. Logs

A

Answer: B

Explanation:
Exploitation occurs when the attacker successfully uses a vulnerability to gain access to the system. This may involve executing malicious code or triggering a software flaw.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Final stage?

A. Detection
B. Exfiltration
C. Installation
D. Parsing

A

Answer: B

Explanation:
The final stage involves achieving the attacker’s objective, often data exfiltration. This includes stealing sensitive data, escalating privileges, or moving laterally within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is lateral movement?

A. Data encryption
B. Moving within network after access
C. Logging activity
D. Backup

A

Answer: B

Explanation:
Lateral movement occurs after initial compromise, where attackers move across systems to find valuable data. It is a key stage in advanced attacks and often hard to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens in installation?

A. Detection
B. Backdoor creation
C. Logging
D. Encryption

Answer: B

Explanation:
In this stage, attackers establish persistence by installing backdoors, web shells, or modifying services. This ensures continued access even after reboots.

A

Answer: B

Explanation:
In this stage, attackers establish persistence by installing backdoors, web shells, or modifying services. This ensures continued access even after reboots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is MITRE ATT&CK?

A. Firewall
B. Threat framework of TTPs
C. SIEM
D. Antivirus

A

Answer: B

Explanation:
MITRE ATT&CK is a framework that categorises attacker behaviours using tactics, techniques, and procedures (TTPs). It helps organisations understand and detect attack patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does TTP stand for?

A. Tools, Targets, Protocols
B. Tactics, Techniques, Procedures
C. Threat, Tools, Processes
D. Tactics, Targets, Payloads

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is threat hunting?

A. Blocking traffic
B. Proactively searching for threats
C. Logging data
D. Encryption

A

Answer: B

Explanation:
Threat hunting is a proactive approach where analysts actively search for hidden threats that automated tools may miss. It goes beyond alerts and assumes attackers may already be present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Structured hunting is based on:

A. Random search
B. Known attack patterns
C. Logs only
D. Encryption

A

Answer: B

Explanation:
Structured hunting uses known patterns such as MITRE ATT&CK techniques to guide investigations. It is systematic and based on prior knowledge of attacker behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unstructured hunting is:

A. Based on intelligence
B. Random or hypothesis-free
C. Based on logs only
D. Detection only

A

Answer: B

Explanation:
Unstructured hunting is exploratory and does not follow predefined patterns. Analysts search for anomalies without specific indicators, making it more flexible but less focused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Situational hunting is based on:

A. Random
B. Specific triggers or alerts
C. Encryption
D. Logs only

A

Answer: B

Explanation:
Situational hunting is triggered by specific events, such as new vulnerabilities or alerts. Analysts investigate based on current threats or incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly