1.0 Identify Flashcards

1
Q

Active

A

Active fingerprinting is performed with a scanning tool that sends specifically crafted packets and examines their responses to determine the operating system version and service-related information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive

A

Passive fingerprinting attempts to learn more about a targeted service without the targeted service without the target knowing it. A form of packet sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nessus

A

Tenable Nessus is a comprehensive vulnerability scanner that provides high-speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nmap

A

Nmap can help a pen tester by scanning the status of network ports, enumerating the host information like its operating system, and identifying the IP address of all active hosts on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Switch Port analyzer (SPAN) ports

A

SPAN is an approach in which a network appliance (switch or router) takes the network packets that flow to and from one main port (or VLAN) on the device, then copies those packets to another port (mirror port). The mirror port then forwards the copied packets to the network monitoring system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Test access point (TAP) devices

A

TAP is not a port on an existing device, but a dedicated device itself. The TAP device sits between network appliances, often between a switch and router, and forwards both incoming and outgoing packets between those appliances to a security monitoring system. Packets are also copied to separate monitoring ports on the TAP device (one for incoming traffic, one for outgoing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

service-level agreements (SLAs)

A

Clearly defines what services are to be provided to the client, and what support, if any, will be provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Common Vulnerability Scoring System (CVSS)

A

A risk management approach to quantifying vulnerability data and then taking into account the severity of harm to different types of systems or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Common Vulnerabilities and Exposures (CVE)

A

A database of software-related vulnerabilities. Maintained by the MITRE Corporation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Weakness Enumeration (CWE)

A

Sponsored by MITRE, provides a catalog of software weaknesses and vulnerabilities, with the goal of reducing security-related software flaws and creating automated tools to identify, correct, and prevent such flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Common Attack Pattern Enumeration and Classification (CAPEC)

A

A database that classifies specific attack patterns. Maintained by the MITRE Corporation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat Modeling

A

The process of identifying and assessing the possible attack vectors that target systems.
1. Identify security objectives and requirements
2. Identify the architecture of the target system, including its components, roles, services, and dependencies
3.Decompose the system further to identify how it functions and how those functions can be vulnerable
4. Identify know threats to the target system
5. Determine ways to mitigate these threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network topology and architecture information

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Collect artifacts and evidence based on volatility level

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assets and underlying risks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data collection

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data analysis and e-discovery

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threat targets

A

Individuals
Non-profit associations
Corporations
Governments
Critical Infrastructure
Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Mobile

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IOT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SCADA

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ICS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PLC

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Threat actors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Threat motives/reasons
26
Threat intent
27
Attack Phases
28
Attack Vectors
29
Technique criteria
30
GDPR
31
HIPAA
32
COPPA
33
GLBA
34
CAN-SPAM
35
National Privacy laws
36
NIST Privacy Framework
37
ISO/IEC 27000 series
38
ISO 29100
39
AICPA/CICA Generally Accepted Privacy Principles (GAPP)
40
Federal Trade Commission
41
ANSI/ISA-62443
42
NIST Special Publication 800 series
43
Standard of Good Practice from ISF
44
NERC 1300
45
RFC 2196
46
PCI DSS
47
SSAE 18
48
NIST Cybersecurity Framework
49
CIS Critical Security Controls
50
COBIT
51
NIST Special Publication 800-61
52
DOD Risk Management Framework (RMF)
53
IT Assurance Framework (ITAF)
54
OWASP
55
MITRE
56
CAPEC
57
CSA
58
Critical assets and data
59
Establish scope
60
Determine vulnerability assessment frequency
61
Identify common areas of vulnerability
62
Users
63
Internal acceptable use policies
64
Operating systems
65
Networking software
66
Network operations and management
67
Firewall
68
Database software
69
Access points
70
Routers
71
Wireless Routers
72
Switches
73
Firewall
74
Modems
75
Network Address Translation (NAT)
76
Network configurations
77
Network services
78
DSL
79
Wireless protocols
80
Ip addressing
81
Configuration files
82
IOC information
83
Perform Vulnerability assessment
Determining scanning criteria Utilize scanning tools Identify and assess exposures Generate reports
84
Conduct post-assessment tasks
Remediate/mitigate vulnerabilities Recovery planning processes and procedures
85
Hardening
86
Patches
87
Conduct audit/validate action was taken
88
Vendor agreements, NDAs, and vendor assessment questionnaires