Phishing & Social Engineering
Threat Actor TTPs (MITRE)
SIEM & Alert Triage
Cloud Security AWS
Incident Response
100

What protocol-based weakness allows attackers to spoof email "From" addresses if SPF, DKIM and DMARC are misconfigured?

What is email header spoofing during to improper domain authentication? 

100

What does TTP stand for?

What are Tactics, Techniques, and Procedures?

100

What does SIEM stand for?

What is Security Information and Event Management?

100

What does IAM stand for in cloud security?

What is Identity and Access Management?

100

This is a critical first step in the incident response process involves confirming whether an observed anomaly is a real security event and assessing its potential impact.

What is triage?

200

What is the psychological principle behind phishing emails that use urgent subject lines like "Account Suspended" or "Payment Failure"?

What is social engineering through fear or urgency?

200

What MITRE tactic involves gaining a foothold on a target system?

What is Initial Access?

200

What’s the first step when triaging a high-severity alert?

What is validating the source and context of the alert?

200

 In AWS, what service provides logs of API calls and user actions?

 What is CloudTrail?

200

What are the six typical phases of the incident response lifecycle?

What are preparation, detection, analysis, containment, eradication, and recovery?

300

In a phishing campaign, what technique involves using homoglyph domains (e.g. "rn" for "m") to bypass visual detections?

What is typo squatting or IDN homograph attack?

300

 Which technique is used to execute code from memory and evade detection?

What is process injection?

300

Which log source is commonly used to identify failed login attempts?

What are authentication logs (e.g., Windows Event ID 4625)?

300

What Azure service manages conditional access and user risk policies?

What is Entra ID (formerly Azure AD)?

300

What’s the difference between containment and eradication?

Containment isolates the threat; eradication removes it from the environment.

400

What advanced phasing technique involves hijacking a legitimate email thread and injecting malicious replies?

What is conversation/thread hijacking?

400

 What is the name of the MITRE ATT&CK group known for ransomware and extortion targeting large enterprises?

Who is FIN12 or Scattered Spider?

400

What’s the term for an alert that appears malicious but is verified to be benign?

What is a false positive?

400

What is a common misconfiguration that leads to public data exposure in AWS?

What is an open S3 bucket?

400

What type of incident involves attackers encrypting files and demanding payment?

What is a ransomware attack?

500

What's one meshing attackers use to bypass email security filters and sandboxing tools when delivering payloads? 

What is payload obfuscation using encryption attachments, HTML smuggling, or multi-stage payload delivery? 

500

 What tactic involves clearing logs or deleting artifacts post-compromise?

What is Defense Evasion or Impact?

500

When an alert shows a rare parent-child process relationship (e.g., Word spawning PowerShell), what tactic is likely involved?

 What is Execution or Defense Evasion?

500

What is the term for a cloud resource assuming another role without user interaction?

 What is role assumption (STS:AssumeRole)?

500

 In a major incident, what is the first action after confirming compromise?

What is executing containment procedures and notifying the IR team?

M
e
n
u