click below
click below
Normal Size Small Size show me how
Security+ Chapter 2
Security+ Chapter 2 Review Questions
| Question | Answer |
|---|---|
| What characteristics differentiate the types of cybersecurity threat actors? | Internal vs. external, level of sophistication/capability, resources/funding, and intent/motivation |
| What is a script kiddie? | The term script kiddie is a derogatory term for people who use hacking techniques but have limited skills. |
| What term describes the means that an attacker uses to gain access to a system? | Threat vectors are the means that threat actors use to obtain access to a system. |
| What is threat intelligence? | Threat intelligence is the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment. |
| What is open source threat intelligence? | Open source threat intelligence is threat intelligence that is acquired from publicly available sources. |
| What are three common questions that come into play when we assess a threat intelligence source or a specific threat intelligence notification? | 1. Is it timely? 2. Is the information accurate? 3. Is the information relevant? |
| Name some sources you can use when you build your threat research toolkit. | Vendor security information websites, vulnerability and threat feeds from vendors, government agencies, private organizations, academic journals and technical publications, professional conferences and local industry group meetings, and social media. |
| What type of attacker acts with authorization? | White hat hackers are those who act with authorization and seek to discover security vulnerabilities with the intent of correcting them. |