4.0 Flashcards
(80 cards)
Volatile
Temporary memory or data that is lost when power is turned off or the system is restarted.
COOP
Continuity of Operations Planning
Process ensuring essential functions continue during and after disasters
Stakeholder Management
Engaging with individuals/groups that have an interest in a process or the outcome of a process.
Communication Plan
Provides direction on how to communicate issues related to an incident.
Tabletop Exercise
A discussion-based exercise where participants sit around a table and talk through one or more scenarios, such as a cyberattack or a natural disaster.
nmap
Network scanning tool for discovering hosts, services, and network information.
openssl
Open-source library for secure communication and cryptographic protocols.
grep
Command-line utility for searching text or patterns within files using regular expressions.
curl
Command-line tool for transferring data with URLs, supporting various protocols.
Head
Beginning or top part of a file or data stream, often used to display initial content.
Tail
Command-line utility displaying the last part of a file or data stream, often used for real-time log monitoring.
Scanless
command-line utility to perform port scans without active probing, aiming to avoid detection.
Reconstitution
Process of restoring systems/data to their original/functional state after a disruption or incident.
Precursors
Early indicators or warning signs preceding an event, used in identifying potential threats or vulnerabilities.
tracert
Command-line tool tracing data packet routes from source to destination, showing intermediate hops and response times.
netstat
Command-line utility displaying open network connections, routing tables, and interface statistics on a computer.
dig
Command-line tool querying DNS servers for domain information, IP addresses, DNS records, and name servers.
netcat
Command-line networking utility establishing TCP/UDP connections, sending/receiving data, and performing port scanning.
hping
Command-line utility for network packet manipulation and analysis, including sending custom packets like TCP, UDP, and ICMP packets from scratch and sending ping request with TCP, UDP packets
ipconfig/ifconfig
ipconfig-Displays network configuration information.
ifconfig-Displays and configures network interfaces.
ping
Sends echo requests to a designated machine to determine if communication is possible.
netcat
Command-line utility for networking tasks such as creating TCP or UDP connections, port scanning, transferring files, and debugging network protocols.
ARP command
Allows a system administrator the ability to see and manipulate the ARP cache on a system.
Cuckoo
A sandbox used for malware analysis