Cyber Kill Chain
Phases of the hacking cycle
Threat sources
Attacks and how to Identify them
Vulnerabilities/ Vulnerability Assessments
100

A component of intelligence-driven defens for the identification and prevention of malicious intrusion activities.

Cyber Kill Chain Methodology

100

What are the two types of reconnaissance?

Passive reconnaissance 

active reconnaissance

100

Fires, floods, and power failures are types of what kind of threat source?

Natural

100

This malicious code is contained inside an apparently harmless program and activates when the user performs some predefined actions to create a covert communication channel between the victim machine and the attacker

Trojan

100

Two common reasons behind the existence of a vulnerability.

1. Hardware/software misconfiguration

2. Insecure/poor design of network/application

3. Inherent technology weaknesses

4. Careless end users

200
The cyber kill chain helps security professionals to understand what three things?

Adversary's tactics, techniques, and procedures beforhand.

200

Searching public records or news releases is a type of which sort of reconnaissance?

Passive Reconnaissance

200

What are the two types of intentional threat sources?

Internal and external

200

Name four indications there is a virus attack occuring

1. degraded performance               5. Computer freezes frequently

2. computer beeps with no display  6. files/folders are missing

3. OS does not load                        7. suspicious hard drive activity

4. constant antivirus alerts              8. browser windows freezes

200

What TCP/IP protocols are inherently insecure? Name two

1. HTTP

2. FTP

3. ICMP

4. SNMP

5. SMTP

300

What step in the cyber kill chain creates a deliverable malicious payload using an exploit and a backdoor?

The weaponization phase

300

In the gaining access phase of the hacking cycle, what are the three levels at which an attacker can gain access?

The Operating system level, the application level, or network level

300

What is the malicious software that damages or disables computer systems and gives control to the attacker?

Malware

300

Blinking computer screen/backward display

Default background setting changing automatically

web pages open on their own

color settings change

Antivirus is automatically disabled and bizarre messages suddenly appearing are examples of what

Trojan attack

300

What may be used to identify exploitable weaknesses within a system and predict the effectiveness of additional security measures?

Vulnerability Assessment

400
In what step does the attacker exploit a vulnerability by executing code on the victim's machine?

The Exploitation phase

400

Attackers must always do what in order to hide their idetities?

Cover their tracks

400

What are three ways malware can enter a system?

1. Instant messenger applications                    5. Downloading files from the internet

2. Removable devices                                      6. Email attachments

3. browser/email software bugs                        7. installation by other malware

4. untrusted sites/freeware web apps/software   8. Bluetooth/wireless networks

400

How is a worm different from a virus?

A worm replicates on its own

a worm spreads through the infected network

400

What is the first step in the Vulnerability-Management life cycle?

Identify assets and create a baseline

500

What are the seven phases of the cyber kill chain in order

1. Reconnaissance           5. Installation

2. Weaponization             6. Command and Control

3. Delivery                      7. Actions on Objectives

4. Exploitation

500

What are the five phases in the hacking cycle? (In order)

1. Reconnaissance          5. Clearing tracks

2. Scanning

3. Gaining Access

4. Maintaining Access

500

Name three types of malware.

1. Trojans          6. PUAs/Grayware

2. Viruses          7. Spyware

3. Ransomware     8. Keyloggers

4. Computer worms   9. Botnets

5. Rootkits               10. Fileless malware

500
What are the six stages of the virus lifecycle?

1. Design           4. Detection

2. Replication      5. Incorporation

3. Launch            6. Execution of the damage routine

500

What is remediation, which is step four in the vulnerability management life cycle?

Remediation is the act of addressing vulnerabilities in your network/system in order to remove the security risk it creates.

M
e
n
u