SG#1 Flashcards

1
Q

Deterrent Control

A

A Deterrent Control serves to inhibit the attacker by reducing the possibility of success from the viewpoint of the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Preventive Control

A

Preventive Controlrefers to the prevention of specific action from occurring. For example, Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Corrective Control

A

Corrective Control is an attempt to reduce the amount of damage and is used after an event. For example, ‘Backup’ helps the rapid restoration of operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compensating Control

A

To directly address the threat when there is no control available, one thing needed to meet the requirement is ‘Compensating Control.’ For example, the ‘Fire suppression System’ that do not stop fire damage but can limit fire damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Technical Control

A

When some form of technology is used to address the physical security issue, it is referred to as a ‘Technical Control.’ For example, Biometrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Administrative Control

A

Limiting the security risks through policies and procedures is known as ‘Administrative Control.’ For example: Giving instructions to a security guard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Owner

A

The data owner is accountable for specific data, and is often a senior officer of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Protection Officer (DPO)

A

The data protection officer (DPO) is responsible for the organization’s data privacy. The DPO commonly sets processes and procedures for maintaining the privacy of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Steward

A

Manages access rights to the data. Example the IT Team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Processor

A

Is often a third party that processes data on behalf of the data controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Controllers

A

Are people in charge of the data’s processing purposes and methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSINT

A

Open Source Intelligence
Is the process of obtaining information from open sources, such as social media sites, corporate websites, online forums, and other publicly available locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wireshark

A

Is protocol analyzer and it can provide information about every frame that traverses the network. it can show process and details about the payloads used during the attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Netstat

A

Command to display connectivity information about a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nmap

A

A tool for understanding the potential exploit vectors device, but it wont show information about an active exploitation attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jump Server

A

A Jump server is a highly secured device commonly used to access secure areas of another network.

It usually connects to the jump server using the SSH or VPN tunnel and then jumps to another devices on the inside of the protected Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MSP`

A

Manages Service Provider
Provides outsourced monitoring and administration of security devices and systems.
It usually manages firewalls, intrusion detection , virtual private networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HSM

A

Hardware Security Module
Provides a way for Cryptographic functions like hashing, encryption etc. it manages and stores keys in a secure location by keeping the back up of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NAC

A

Network Access Control
With NAC, the traffic flow from inside or outside the network is controlled.
It can be enable or disabled easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Airgap

A

Logical or physical separation of a network from all other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RADIUS

A

Remote Authentication Dial-In User Service
Is a common authentication Method of centralizing authentication for users.
This avoids the need to have separate local accounts on different devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PAP

A

Password Authentication Protocol
Is an authentication method that can validate a username and password.
It does not provide centralized authentication database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPSec

A

Its primary goal is to offer CIA (Confidentiality, integrity and Authentication)
It is commonly used as an encrypted tunnel between sites or endpoints.
It is useful for protecting data sent over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Least Privilege

A

It limits the rights and permission of a user account to only the access required to accomplish their objectives.
This policy would limit the scope of an attack originating from a user in the IT department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Separation of Duties

A

It ensures that multiple users are required to complete a single business process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DAC

A

Discretionary Access Control
With this, access and permission are determined by the owner or originator of the files or resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

WPS

A

Wifi Protected Setup

Provides simplified mechanisms to configure secure wireless networks.

The External registrar PIN exchange mechanism is susceptible to bruteforce attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Acceptance

A

Risk acceptance is a business decision that places the responsibility of the risky activity on the organization itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Mitigation

A

Strategies to limit the impact of threat against data in custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Transference

A

The act of shifting risks from one area (or organization) to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Risk-avoidance

A

The elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Sideloading

A

The installation of software from a third party rather than an approved source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

OTA

A

Over The Air

Updates commonly provided from the carrier and are not part of mobile app installations.

34
Q

Tethering

A

is the practice of using a mobile device as a modem to connect another device, such as a laptop or another mobile phone to the internet.

35
Q

RAID

A

Redundant Array of Independent Disks
It is used to increase the reliability of storage disk.

36
Q

RAID 0

A

A striped storage system with no parity, and a single drive failure does not maintain uptime or any redundancy of data.
It fails when one or more drives fail.

Largest size and fastest.

37
Q

RAID 1

A

Maintains a mirror of data across multiple drives.
If a single drive was to fail, the mirror would continue to operate.

Smallest and slowest
For recovery, only one drive is required.

38
Q

RAID 3

A

Set of stripes with special parity
Data is distributed evenly among two or more disks, as well as a parity drive.

For sequential read/write operations.

A single drive failure will cause the system to rebuild.

39
Q

RAID 5

A

Provides redundancy through striping with parity. Although this arrays will continue to operate through a single drive failure, the data will not replicate across drives.

40
Q

RAID 10

A

Is the combination of 1 + 0 maintains mirrored drives that contain striped data.

41
Q

RAID 10

A

Is the combination of 1 + 0 maintains mirrored drives that contain striped data.

42
Q

NULL Pointer Dereference

A

Occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

43
Q

OCSP

A

Online Certificate Status Protocol
Using this, the browser can check certificate revocation or the certificate status.

44
Q

CSR

A

Certificate Signing Request
It starts with a pair of key creations. One is a private key that is kept on the website, and the other is a public key that is sent to the certification authority to be digitally signed.

45
Q

KEY Escrow

A

The system responsible for storing and providing a mechanism for obtaining copies of private keys associated with encryption certificates.

46
Q

ESP

A

Encapsulation Security Payload
Protocol that encrypts the data that traversers the VPN.

47
Q

Deffie-Hellman

A

An algorithm used for two devices to create identical shared keys without transferring those keys across the network.

48
Q

Minimization

A

Is a guideline that limits the amount of collected information to necessary data.

49
Q

Anonymation

A

It changes the data to remove or replace identifiable information.

50
Q

Tracecert

A

command allows mapping an entire path between two devices to know what routes may be between point A and point B.

51
Q

Dig

A

Domain Information Grouper
It can be used to perform reverse-lookup of the IPv4 address and determine the IP address block owner that may be responsible for the traffic.

52
Q

SLA

A

Service Layer Agreement
Is a contract that specifies the minimum terms for provided services.

53
Q

SAE

A

Simultaneous Authentication of Equals

The technique produces a cryptographically strong shared secret
that can secure other data, such as network communication, Passive, active and dictionary attacks are all resistant to SAE

54
Q

IR Process

A

Preparations
Detection
Analysis
Isolation and Containment
Eradication
Recovery
Reconstitution
Lessons Learned.

55
Q

NsLookup

A

Lookup information from DNS servers like IP addresses, Cache Times, canonical names, etc.

56
Q

ipconfig/ifconfig

A

Determines TCP/IP and network adapter information and some additional IP details.

For Linux and Max is “ifconfig”.

57
Q

Tcdump

A

captures packets from the command line

58
Q

Nmap

A

Offers host discovery, port discovery, service discovery.
Hardware (MAC) address information, Service version detection, Vulnerability and exploit detection can be found using Nmap scripts (NSE).

59
Q

ping/pathping

A

A command is merged together with the functionality of ping and traceroute to create a single command called pathping.

Pathping will run a traceroute to a destination IP address to determine what routes may be in between your local devices and the one you are running as part of pathping.

60
Q

hping

A

TCP/IP packet assembler and analyzer. it receives IP data, de-packets that data, and moves it to the linked device in the reverse order.

61
Q

netstat

A

Netstat stands for “Networks statistics”. Provides statistics about all active connections so you can find out which computers or networks a PC is connected to.

62
Q

IP Scanners

A

is cmd tool to scan the network for IP addresses. This usually uses a number of different techniques to identify and then display the devices and port numbers on your systems.

63
Q

ARP

A

Address Resolution Protocol
It is a stateless protocol to ensure communication by resolving the IP address to MAC address mapping withing a broadcast domain.

64
Q

ARP Spoofing Attack

A

An attacker sends forged ARP packets over a Local Area Network (LAN).

The switch will update the attackers MAC’s address with the IP address of a legitimate user or server.

65
Q

Route

A

Is used to view the device’s routing table and help to fins the best possible way in which the packets will go.

66
Q

Curl

A

Client URL.
It refers to a URL that you can use to access the web pages, perform FTP, or receive emails.

It allows to grab raw data from different sites and display it on the terminal screen.

67
Q

The Harvester

A

Tool used to obtain free information from public websites.

68
Q

Spiner

A

Reconnaissance tool that integrates different reconnaissance tools into one framework to provide one set of queries and outputs for all different functions.

69
Q

Scanless

A

Tool used to avoid your device to be used as the scan source when performing a port scan. This is done by using a different host that will act as a proxy for port scanning.

70
Q

Dnsenum

A

Command that will enumerate DNS information from a DNS server.

71
Q

Nessus

A

Vulnerability tool that has extensive reporting help to identify vulnerabilities, and it helps to resolve the vulnerabilities on the system.

72
Q

Cuckoo

A

Sandbox that is specifically written to run the programs inside and identify any malware.

73
Q

head

A

command to see the top part of the file

74
Q

tail

A

command to view the last portion of the file.

75
Q

cat

A

Short for concatenate.
Used to view multiple files or linked them together to create a large file.

76
Q

grep

A

allows us to find any bit of text that we require in the file.

77
Q

chmod

A

Allows changing the mode of the file system object to read, write or execute.

78
Q

Logger

A

Responsible for adding the additional information into the system log in that operating systyem.

EX, syslog

79
Q

ARO

A

Annual Rate of Occurrence
Describes the number of instances that an event would occur in a year.

80
Q

ALE

A

Annual Loss Expectancy
Expected cost for all events in a single year.

81
Q

SLE

A

Single Loss Expectancy
Is the monetary loss of a single event occurs.

82
Q

MTTR

A

Mean Time To Repair
The amount of time required to repair a product or system after failure.