Question 1: An organization detects automated port scanning using common, publicly available tools followed by the deployment of generic ransomware with no customization. The threat actor shows minimal technical skill and relies entirely on pre-built exploit kits downloaded from forums. Which term BEST describes this threat actor?
Question 2: Over the past 18 months, a defense contractor has observed extremely stealthy network traffic exfiltrating sensitive schematics to an overseas IP address only during off-peak hours. The attacker used previously unknown exploits and custom malware that erased logs upon detection. This operation required significant funding and patience. Which actor is most likely responsible?
Question 3: A hospital's systems are encrypted by ransomware. The ransom note includes a professional call center number for negotiation, and the payment is demanded in cryptocurrency with detailed instructions on how to purchase it. The malware is identified as a variant sold on underground forums with a revenue-sharing model. Which actor profile fits this description?
Question 4: A group claiming affiliation with an environmental activism movement has launched a prolonged DDoS attack against an oil company's public website and replaced the homepage with a political manifesto. They have made no attempt to steal money or intellectual property. What is the primary motivation classification for this group?
Question 5: A network administrator, fearing impending layoffs, creates a hidden backdoor account to access the company's customer database six months after termination for the purpose of selling the data to a competitor. What type of threat does this represent?
Question 6: An employee installs an unapproved Cloud storage application on their work laptop to synchronize large project files for personal convenience, inadvertently bypassing corporate Data Loss Prevention controls and uploading sensitive documents to a personal account. What term describes this activity?
Question 7: The IT department is reviewing all publicly exposed APIs, open ports, wireless access points, and employee user accounts to determine the total sum of possible entry points an attacker could potentially use. What concept are they assessing?
Question 8: An attacker sends an email containing a malicious link disguised as a shipping notification to a senior executive's inbox to deliver credential-harvesting malware. What is the BEST description of this activity?
Question 9: A researcher discovers a flaw in a widely used operating system that allows privilege escalation. No patch exists because the vendor is currently unaware of the vulnerability. An attacker begins exploiting this flaw immediately in the wild. What type of vulnerability is this?
Question 10: The company's Chief Financial Officer (CFO) does not wish to pay for security updates because he sees it as a waste of money. What term describes the assessment of dangers posed by NOT keeping systems up to date?
Question 11: A manufacturing plant continues running an end-of-life operating system on its industrial controllers that no longer receives security patches from the vendor, making it highly susceptible to known public exploits. What term describes these systems?
Question 12: A managed service provider's remote monitoring software is compromised by attackers who insert a backdoor into a routine, digitally signed software update that is automatically pushed to thousands of client environments. Clients trusting the vendor's certificate install the malware. What type of attack vector is this?
Question 13: An attacker leaves infected USB drives labeled "Confidential Salary Information - 2024" in a company parking lot, hoping curiosity will lead employees to plug them into work computers. What type of attack vector is this?
Question 14: An attacker wearing a courier uniform carries a large box and follows an employee through a secure badge-access door before it closes, claiming their hands are full and they need to make a delivery. Which physical social engineering technique is being used?
Question 15: An attacker registers the domain "techsupp0rt-login.com" using a zero instead of the letter 'o' to catch users who mistype the software vendor's support website address. What technique is being used?
Question 16: An attacker conducting OSINT research identifies that employees of a specific defense contractor frequently visit a particular industry news blog. The attacker compromises that legitimate website to infect only those specific visitors with malware targeting their browsers. What is this attack called?
Question 17: The CFO receives an urgent email appearing to be from the CEO instructing them to immediately wire $500,000 to a new vendor for a confidential acquisition. The display name matches the CEO's address, but the actual email address is slightly different. What specific type of social engineering technique is in use?
Question 18: A nation-state actor creates thousands of fake social media accounts to spread disinformation about election processes in a foreign country, aiming to destabilize public trust and create social division without directly hacking systems. This is an example of what?
Question 19: The Chief Executive Officer (CEO) of a company asks the Chief Information Security Officer why the company cannot be kept 100% safe. The CISO explains that as the company has grown, the increased number of devices and personnel has provided more opportunities for attackers to gain unauthorized access. Which term BEST describes this concept?
Question 20: An employee receives a phone call claiming to be from the technical support helpdesk. The caller asks the employee to supply their password over the phone, claiming that it is safe because the rest of the employee's team have also given their passwords. What specific social engineering technique is in use?