1.0 Security Concepts (Ch 1-4) Flashcards

(75 cards)

1
Q

The deep web is characterized by…

A

Not being indexed by search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The dark web is characterized by…

A

using specific software configs to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is searchsploit?

A

A command-line tool that enables you to download the Exploit Database from Offensive Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The likelihood or probability of the occurrence or realization of a threat is…

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The three basic elements of risk are:

A

assets, threats, and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RMF stands for

A

Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Knowledge about existing or emerging threats is…

A

threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The five-step threat intelligence process:

A

Planning & Direction
Collection
Processing
Analysis and Production
Dissemination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are STIX, TAXII, CybOX, OpenIOC, and OpenC2?

A

Means of disseminating threat information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a TIP?

A

Threat Intelligence Platform, a way to aggregate intelligence info from multiple sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SQL, HTML, and command are three types of…

A

injection vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What might a SQL injection attack do?

A

View, insert, modify, or delete database records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In-band, out-of-band, or blind/inferential are types of…

A

SQL injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a command injection attack, commands will be executed with what privilege level?

A

The privilege level of the compromised application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens in an online brute-force attack?

A

Attacker tries to log in as user by guessing their password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens in an offline brute-force attack?

A

Attacker tries to gain access to encrypted or hashed passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Predicting tokens, session sniffing, MITM, and MITB are four techniques by which an attacker can execute a…

A

session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

XSS stands for

A

Cross-Site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Back-end parameters visible in URLs are what kind of vulnerabilities?

A

Insecure Direct Object Reference Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Three categories of XSS:

A

Reflected (nonpersistent)
Stored (persistent)
DOM-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Getting a user to click on a malicious link is what type of XSS attack?

A

Reflective (non-persistent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

If a user requests information that’s stored on a vulnerable or malicious server, what type of XSS attack is this?

A

Stored (persistent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What do you call a language-independent, cross-platform API that treats HTML/XHTML/XML documents as a tree structure?

A

DOM (Document Object Model)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a CSRF (or XSRF) attack?

A

Cross-Site Request Forgery - when unauthorized commands are sent to an application from a trusted user.

aka one-click attacks or session riding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
An application stores user input, embeds the input in a DOM response, a client-side script processes the input, a DOM-based vulnerability is triggered, and the script writes controllable data in the cookie. What sort of attack is this?
A Cookie Manipulation Attack
26
What is it called when a system or application tries to perform two sequential operations at the same time?
A race condition
27
SOAP, REST, and GraphQL are three technologies for creating...
an API
28
Swagger, WSDL, and WADL are types of...
API documentation
29
ASCII armoring can protect against...
Return-to-LibC attacks
30
What organization maintains a "top 10 common vulnerabilities" list?
OWASP (Open Web Application Security Project)
31
What are Qualys, Nexpose, and Nessus?
Vulnerability scanners
32
What are BlackDuck, FlexNet Code Insight, SourceClear, and WhiteSource?
Software composition analysis tools
33
What does a Webtype ACL do?
Manages traffic coming through an SSL VPN
34
What does Cisco Application-Centric Infrastructure (ACI) do?
It's a firewall solution for virtual machines
35
What does the Cisco Application Policy Infrastructure Controller (APIC) do?
Deploys policies to ACI instances
36
Cisco's own team of security researchers is called...
Talos
37
Cisco AMP comes in three flavors:
Endpoints Networks Content Security Appliances
38
These devices: Web Security Appliance (WSA) Security Management Appliance (SMA) Cloud Web Security (CWS) ...all do what?
Protect against malware
39
What is the difference between explicit and transparent proxies?
Whether or not the client/end-user is aware they're going through a proxy
40
What is the WCCP protocol?
Web Cache Communication Protocol; a means by which a Cisco router registers with a WSA appliance.
41
SPF, SIDF, and DKIM are all methods of...
email authentication
42
What is the Cisco product that centralizes the management and reporting of multiple ESAs and WSAs?
SMA (Security Management Appliance)
43
SGTs are...
Security Group Tags
44
SGACLs are...
Security Group Access Control Lists
45
What is the Cisco NAC Web Agent?
A temporary agent installed on end-user machines at login
46
What is the Cisco NAC Agent?
A permanent agent installed on a Windows or Mac system
47
What is "Glovebox"?
A feature of Cisco AMP Threat Grid which allows you to interact with malware in real time
48
What Cisco acquisition offers both free and premium services?
OpenDNS
49
Cisco Umbrella and Investigate are two premium services offered by what global network service?
OpenDNS
50
What is NetFlow?
NetFlow is a Cisco-proprietary network protocol used for collecting and monitoring IP network traffic flows
51
What SaaS product monitors AWS VPC Flow Logs, GCP Flow Logs, and Azure NSG flow logs?
Stealthwatch
52
DLP stands for
Data Loss Prevention
53
A Cisco service which protects data in cloud environments is
CloudLock
54
What is the IETF's version of the Cisco-proprietary NetFlow?
IPFIX (IP Flow Information Export)
55
What are the elements of a 5-tuple?
Source/dest IP, source/dest ports, and IP protocol
56
What is ISO 27001?
The international standard for implementing an information security management system (ISMS)
57
DFIR stands for...
Digital Forensics and Incident Response
58
A Type 1 error in a biometric authentication system is what?
False Rejection Rate (FRR) - the system rejected a valid user who should have been authenticated
59
A Type 2 error in a biometric authentication system is what?
False Acceptance Rate (FAR) - the system authenticates a user who should have been rejected
60
What is the crossover error rate (CER)?
The point where the FRR and FAR are equal.
61
The first step in the AAA process is...
Identification
62
Government/military asset classification levels:
Top Secret Secret Confidential Unclassified
63
Commercial sector classification levels:
Confidential/Proprietary Private Sensitive Public
64
What does a data custodian do?
Performs day-to-day tasks on behalf of a data owner, ensuring data is available and secure
65
Three access control types:
Administrative Physical Technical
66
In a MAC model, access authorization is provided by ____
the operating system itself
67
An access control list is ____ -centric while a capability table is ____ -centric.
object; subject (user)
68
Diameter is an alternative to...
RADIUS/TACACS
69
Trusted domains, SGTs, and MACSec are all key components of...
Cisco TrustSec
70
MAC security model labels include what two components?
Classification and Category
71
Secure identities need to be three things:
Unique Nondescriptive Securely issued
72
Three techniques of data sanitization before disposal:
Clearing Purging Destroying
73
What is Shodan?
A database of prescanned devices connected to the internet
74
RCE stands for
Remote Code Execution
75
A popular method of data exfiltration attacks is...
DNS tunneling