FOUNDATIONS OF CYBER SECURITY QUESTIONS WITH CERTIFIED
ANSWERS #11
What is cyberspace? (4) - correct answer Information systems, data on them, services they
provide, network device used for communication
What is a cyberattack? - correct answer Malicious attempt to damage, disrupt, or gain
unauthorised access to computer systems, network or devices
What is a cyber vulnerability? (2) - correct answer Weakness or loophole in system
What is cyber security? - correct answer Protection of cyberspace from harm, misuse, or
unauthorised access
UK's National Cyber Security Strategy - correct answer Defend, deter, develop
Who can be behind cyber attacks? (5) - correct answer Cyber criminals, nation states,
hacktivists, insider threats, script kiddies/noobs
Cyber criminal's typical motive - correct answer Money
Cyber criminal's typical attacks (5) - correct answer Money theft, document ransom, data
breach, ddos
Ddos - correct answer Distributed Denial of Service
Cyber criminal's typical attack vectors (3) - correct answer Malware, email, botnet
Cyber criminal example - correct answer Albert Gonzalez, 2005-2007
,Nation state's typical motives (3) - correct answer Collecting information, sabotage, subversion
Nation state's typical attacks (3) - correct answer Influencing campaigns, data breach, ddos
Nation state's typical attack vectors (4) - correct answer Malware, botnets, emails, social media
Nation state examples (5) - correct answer US election, China's Marriott hack, Stuxnet, Ukraine,
Estonia
Hacktivist motives (3) - correct answer Religious, social, and political
Hacktivist typical attacks (4) - correct answer Web defacement, data breach, information leak,
ddos
Hacktivist typical attack vector (3) - correct answer Malware, email, botnet
Hacktivist examples (2) - correct answer Anonymous, Snowden
Insider threat - correct answer Comes from someone with legitimate access to resources
Insider threat motives (3) - correct answer Personal vendetta, bribe, blackmail
Types of insider threat (2) - correct answer Intentional and unintentional
Intentional insider typical attacks (2) - correct answer Information leak, install a logic bomb
Unintentional insider typical attacks (3) - correct answer Accidental posting/deleting
information, visit websites infected with malcode
, Script Kiddies/Noobs - correct answer Less skilled hackers
Script Kiddies/Noobs motives (3) - correct answer Desire to join real groups, challenge, curiosity
Insider threat examples - correct answer Snowden, Manning, Reality Winner
Script Kiddie example - correct answer talktalk 2015
Kill chain stages (7) - correct answer Reconnaissance
Weaponize
Delivery
Exploitation
Installation
Command-and-control
Actions on objectives
Reconnaissance - correct answer Target research and selection, ends when attacker knows
enough
Reconnaissance example - correct answer Identifying the security means used by the target via
online research
Weaponize - correct answer Development or purchase of cyber weapons
Weaponize examples (3) - correct answer Malicious payload, social engineering, remote access
trojan
ANSWERS #11
What is cyberspace? (4) - correct answer Information systems, data on them, services they
provide, network device used for communication
What is a cyberattack? - correct answer Malicious attempt to damage, disrupt, or gain
unauthorised access to computer systems, network or devices
What is a cyber vulnerability? (2) - correct answer Weakness or loophole in system
What is cyber security? - correct answer Protection of cyberspace from harm, misuse, or
unauthorised access
UK's National Cyber Security Strategy - correct answer Defend, deter, develop
Who can be behind cyber attacks? (5) - correct answer Cyber criminals, nation states,
hacktivists, insider threats, script kiddies/noobs
Cyber criminal's typical motive - correct answer Money
Cyber criminal's typical attacks (5) - correct answer Money theft, document ransom, data
breach, ddos
Ddos - correct answer Distributed Denial of Service
Cyber criminal's typical attack vectors (3) - correct answer Malware, email, botnet
Cyber criminal example - correct answer Albert Gonzalez, 2005-2007
,Nation state's typical motives (3) - correct answer Collecting information, sabotage, subversion
Nation state's typical attacks (3) - correct answer Influencing campaigns, data breach, ddos
Nation state's typical attack vectors (4) - correct answer Malware, botnets, emails, social media
Nation state examples (5) - correct answer US election, China's Marriott hack, Stuxnet, Ukraine,
Estonia
Hacktivist motives (3) - correct answer Religious, social, and political
Hacktivist typical attacks (4) - correct answer Web defacement, data breach, information leak,
ddos
Hacktivist typical attack vector (3) - correct answer Malware, email, botnet
Hacktivist examples (2) - correct answer Anonymous, Snowden
Insider threat - correct answer Comes from someone with legitimate access to resources
Insider threat motives (3) - correct answer Personal vendetta, bribe, blackmail
Types of insider threat (2) - correct answer Intentional and unintentional
Intentional insider typical attacks (2) - correct answer Information leak, install a logic bomb
Unintentional insider typical attacks (3) - correct answer Accidental posting/deleting
information, visit websites infected with malcode
, Script Kiddies/Noobs - correct answer Less skilled hackers
Script Kiddies/Noobs motives (3) - correct answer Desire to join real groups, challenge, curiosity
Insider threat examples - correct answer Snowden, Manning, Reality Winner
Script Kiddie example - correct answer talktalk 2015
Kill chain stages (7) - correct answer Reconnaissance
Weaponize
Delivery
Exploitation
Installation
Command-and-control
Actions on objectives
Reconnaissance - correct answer Target research and selection, ends when attacker knows
enough
Reconnaissance example - correct answer Identifying the security means used by the target via
online research
Weaponize - correct answer Development or purchase of cyber weapons
Weaponize examples (3) - correct answer Malicious payload, social engineering, remote access
trojan