EXAM QUESTIONS WITH VERIFIED ANSWERS (100% CORRECT
ANSWERS ) ALREADY GRADED A+.
Mental Models - ANSWER-System I
thinking.
Experience base asumptions and expectations of the way the
world operates
Structured Analytical Techniques - ANSWER-Almost al
include Decomposition (breaking problem into components)
and Visualization (capturing parts of problem in
organized/visual manner) 6 distinct families:
- Getting Organized
- Reframing Techniques
- Exploration Techniques
- Foresight Techniques
- Diagnostic Techniques
- Decision Support Techniques
Threat Modelling Building - ANSWER-Review critical systems
and information
,+ add potential
adversaries
Organization
- financial data (Activity
Group A)
- intell property (Activity
Group B)
- system availability (Activity
Group C)
Threat Modelling Pivoting - ANSWER-- identify
Critical info/assets
- Identify
Adversaries
- Pivot on data
points
VERIS - ANSWER-- Vocabulatory for Event Recording and
Incident Sharing - framework that provides common language
for describing security incidents in structured and repeatable
manner
VERIS Fundamentals - ANSWER-- Incident details
- date, incident ID, confirmaed incident?, discovery method...
+ Four As
, - Action
- Asset
- Actor
- Attribute
Kill Chain - ANSWER-- 7 stages, each NECESSARY for successful
COMPROMISE
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- C2
- Actions on Objectives
Kill Chain - Reconnaissance - ANSWER-- Tasking (why the intrusion, what is
objective)
- Acquisition of tools
- Acquisition of Infra
- Identification of targets
- Organizational research
Kill Chain: Weaponization - ANSWER-Bringing together all
the tools for the
mission
- Cannot be detected, but leaves fingerprints for furter
invesigation
- Configuring (backdoors,
droppers)
- Packaging (container/carrier structure,
exploit...)