2 Flashcards

(29 cards)

1
Q

You are conducting a forensic investigation. The attack has been stopped. What do you do FIRST

A

Document what’s on screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following tools would you use to validate the bandwidth on your network and ID when the bandwidth is significantly below what it should be

A

Throughput tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You want to implement an access control list where only the users you specifically authorize have access to the resource. Anyone not on the list should be prevented from having access. Which of the following methods of access control will the access list use?

A

Explicit allow, Implicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You discover info on a computer HDD that might indicate evidence of illegal activity. You want to perform FORENSICS on thie disk to see WHAT INFO IT CONTAINS. What do FIRST

A

Make a bit level copy of the disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Layer: Fences, Door Locks, Mantraps, Turnstiles, Device Locks, Server Cages

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Layer: Individual Workstation, Laptop, Mobile Device

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Layer: Authentication Authorization, User MGMT, Group Policies

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sec Layer: Cameras, Motion Detectors, Environmental Controls

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sec Layer: VLAN, Penetration Testing, Virtualization

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Found rogue wireless access point on network. Which should you do FIRST to PROTECT NETWORK while PRESERVING EVIDENCE

A

Disconnect the access point from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Best defense against script kiddies

A

Keep systems up to date and use standard security practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attack Strat: Stealing Info

A

Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attack Strat: Prep a computer to perform additional attacks in the attack

A

Staging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack Strat: Crashing systems

A

Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attack Strat: Gathering hardware info

A

Recon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack Strat: Penetrating sys defenses to gain unauth access

17
Q

Attack Strat: Config additional rights to do more than breach the system

A

Escalate Privileges

18
Q

Which algorithm combines a random value with plain text to produce cipher text

19
Q

What is Steganography

A

cryptography method that uses digital pictures, video clips, or audio clips to hide a message

20
Q

Which type of cipher changes the position of the characters in a plain text message

A

transposition

21
Q

ur running a packet sniffer to ID the types of traffic on network. you expect to see all traffic on net, but pack sniffer only seems to capture frames that are addressed to the network interface on your workstation. what do you config to see all

A

Configure the network interface to use PROMISCUOUS MODE

22
Q

After an intrusion has occurred and the intruder has been removed from the system which of the following is the best next step or action to take

A

back up all logs and audits regarding the incident

23
Q

what is a protocol analyzer used for

A

a passive device that is used to copy frames and allow you to view frame contents

does not allow you to capture modify and retransmit frames

24
Q

define hacker

A

general term used to describe any individual who uses their technical knowledge to gain unauthorized access to an organization

25
greatest threat to network security
employees
26
example of privilege escalation
creeping priveleges [changing jobs but keeping priv]
27
principle is implemented in mandatory acccess control model to determine object access by classification level
need to know
28
reduce the risk of a threat agent being able to exploit a vulnerability
countermeasure
29
what would you use a chain of custody for
listing people coming in contact with evidence