Are you threatening me?
Straight on til Dawn
The soft belly of the Beast
You should probably get tested
Mitigating Factors
100

This threat has legitimate access to resources, can pose a significant risk for any organization, but may be intentional or accidental.

What is an Insider Threat?

100

This kind of attack focuses on vendors to achieve a long term end goal with another target

What is Supply Chain attack?

100

This is a method in which a VM gains access to a host system's resources to access local resources or other VMs on the hypervisor

What is VM Escape?

100

This malware is typified by files being encrypted and the key being held until conditions are met

What is Ransomware?

100

This mitigation works by putting networks into logically or physically distinct regions

What is Segmentation?

200

This motivation of a threat actor focuses on obtaining information, one of the most common motivations that has affected you in relation to cyber security

What is Data Exfiltration?

200

This is the most vulnerable attack vector in any scenario

What is Human or User?

200

This vulnerability comes from a previously unknown flaw in software or hardware, particularly dangerous because there may be no known way to defend against an attack

What is a Zero-Day Vulnerability?

200

This malware records user inputs and may remotely transmit them back to the attacker that delivered it to your system

What is a Keylogger?

200

This mitigation works by translating content into code words so that unauthorized parties cannot read the original information

What is Encryption?

300

This threat actor is well funded, highly skilled, and motivated by political, military, or economic advantage

What is a Nation State actor?

300

This kind of attack uses fraudulent text messages sent to a mobile device

What is Smishing?

300

This vulnerability leverages a lack of input validation and improper error handling to allow code to be run on a database through a web application

What is an SQL Injection/SQLi?

300

This type of attack uses collisions to be faster than using a brute force attack, relies on the limited nature of the length of a checksum

What is a Birthday Attack?

300

Installing end point protection, disabling unused ports and protocols, changing default passwords, and other similar measures are known as this

What are Hardening Techniques?

400

This threat actor is driven by ideological or political goals

What is a Hacktivist?

400

This attack vector relies on misspellings to bring users to domains other than what they intended to go to, this can be mitigated by owning common misspellings of their domain

What is Typosquatting?

400

This vulnerability is commonly found to be using scripts hidden within social media comment sections, where an attack is stored on the server but runs within the user's browsers

What is a Cross-Site Scripting XSS attack?

400

Mary went to Starbucks and used the public WiFi without a VPN to build a new website for her butterfly breeding business and the next day all of her accounts had been compromised because she was a victim of this kind of attack

What is an On-Path attack (also Man in the Middle, but that term will not appear on a CompTIA exam anymore)?

400

This principle states that access for a user should be restricted to what a user needs to perform their job role

What is the Principle of Least Privilege?

500

This specific threat causes an often accidental increase in attack surface within a network that can be exploited by threat actors

What is Rogue or Shadow IT?

500

This attack vector involves using well known user names and passwords to attempt to break in to a network

What is Default Credentials?

500

This vulnerability writes more data to a buffer than it can handle, causing adjacent memory locations to be overwritten

What is a Buffer Overflow attack?

500

A user reporting that they are unable to log in without a system administrator unlocking their account is an indicator of what kind of attack on the user's account?

What is Brute Force attack?

500

This process ensures that data cannot be accessed from systems once they are no longer in production use before device disposal

What is decommissioning?

M
e
n
u