Operational Concepts
Adversary Methods
Cyber Kill Chain
Defensive Operations
Access & Control
100
What is the risk posed by trusted users misusing access? 

Insider threat

100

What is malicious software designed to harm or exploit systems?

Malware

100
What stage includes achieving the attacker goals?

Actions on the Objective

100

What is the term for the process of detecting, containing, and recovering from attacks?

Incident Response

100

What is using multiple verification methods called?

MFA

200

What is a highly skilled, persistent adversary targeting specific entities over time?

APT

200

What is an exploit for an unknown/unpatched vulnerability?

Zero-day Exploit

200

What stage takes advantage of a vulnerability?

Exploitation

200

What is the term for dividing networks to limit the spread of attacks?

Network Segmentation

200

What is it called when someone attempts to crack a password by guessing passwords repeatedly?

Brute Force

300

What are patterns of behavior used by threat actors during operations?

TTPs

300

What is the system attackers use to remotely control compromised machines?

C2

300

What stage includes moving within a network?

Lateral Movement

300

What is the term for monitoring endpoints for threats and response actions?

EDR

300

What is a hidden access point to a system called?

Backdoor

400

What are actions taken to achieve objectives in or through cyberspace (offense, defense, or intelligence)?

Cyber Operations

400

What is a network of infected devices controlled by an attacker?

Botnet

400

Which stage includes establishing malware presence?

Installation

400

What is it called when a system administrator trusts nothing and continuously verifies users and devices connecting to the network?

Zero Trust

400

What is it called when a hacker uses stolen credentials across systems?

Credential Stuffing

500
What are actions to defend networks, detect threats, and respond to attacks?
DCO
500

What are deceptive messages to trick users into revealing information?

Phishing

500

What stage includes the gathering of target information?

Reconnaissance

500
What is the term for a simulated attack to test defenses?

Pen Testing

500

What is it called when you verify your identity?

Authentication