1. Threat, Vulnerability, Risk. Define each. Provide an example scenario and describe each of these 3 in that context.
2. Attack scenario phase 0 – Attacker places content on unpatched web site. Identify 3 Critical Controls that would deter this attack – explain how.
3. Attack scenario phase 1 – Attacker installs programs of the attacker’s choosing on the victim machine, using the privileges of the user who ran the browse. Identify 3 Critical Controls that would deter this attack – explain how.
4. Attack scenario phase 2 – Attacker uses outbound HTTPS access from victim to attacker. Identify 3 Critical Controls that would deter this attack – explain how.
5. Attack scenario phase 3 – attacker loads a local privilege escalation exploit program that allows the attacker to jump from the limited privilege user account to full system privileges. Identify 3 Critical Controls that would deter this attack – explain how
6. Attack scenario phase 4 – Windows pass-the-hash program to authenticate to another Windows machine on the enterprise internal network. Identify 3 Critical Controls that would deter this attack – explain how
7. Intrusion Detection & Protection System. Where in a network would you place an IDPS system? Suppose the attack was an illegal port scan, what methods are used by the IDPS for deter the attack? Explain the Type 1 and Type 2 Errors for this case.


0 comments