Module 22 Flashcards

1
Q

Operations security starts with..

A

the planning and implementation process of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens during the phases of operations security?

A

the operations team analyzes designs, identifies risks and vulnerabilities, and makes necessary adaptations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When does the actual operational tasks begin?

A

After the network is set up and include the continual maintenance of the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Staff that set up and conduct security testing should have knowledge in what areas?

A

-Device hardening
-Firewalls
-IPSs
-Operating systems
-Basic programming
-Networking protocols (TCP/IP)
-Network vulnerabilities and risk mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ST&E?

A

An examination of the protective measures that are placed on an operational network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What security tests can be conducted to assess operational status of the network?

A

-Penetration testing
-Network scanning
-Vulnerability scanning
-Password cracking
-Log review
-Integrity checkers
-Virus detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are tools available to test the security of systems and networks?

A

-Nmap/Zenmap
-SuperScan
-SIEM
-GFI LANguard
-Tripwire
-Nessus
-L0phtCrack
-Metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of tool is Nmap and Zenmap?

A

Commonly used and free low-level scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SuperScan?

A

A free Microsoft Windows port scanning tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SIEM? (Security Information Event Management)

A

A technology used in enterprise organizations to provide real time reporting and long-term analysis of security events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do SIEMs provide?

A

Correlation, aggregation, forensic analysis, and retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Nmap/Zenmap do?

A

Discovers computers and their services on an network, therefore creating a map of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does SuperScan do?

A

Detects open TCP and UDP ports, determine what services are running on those ports, and runs queries, such as who is, ping, traceroute, and hostname lookups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does GFI LANguard do?

A

Network and security scanner that detects vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Tripwire do?

A

Assesses and validates IT configurations against internal policies, compliance standards, and security best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does Nessus do?

A

IIt as a vulnerability scanning software that focuses on remote access, misconfigurations, and DoS against the TCP/IP stack

17
Q

What is L0phtCrack?

A

A password auditing and recovery application

18
Q

What does Metasploit do?

A

Provides information about vulnerabilities and aids in penetration testing and IDS signature development

19
Q
A