4.0 Flashcards

1
Q

Volatile

A

Temporary memory or data that is lost when power is turned off or the system is restarted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

COOP

A

Continuity of Operations Planning
Process ensuring essential functions continue during and after disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stakeholder Management

A

Engaging with individuals/groups that have an interest in a process or the outcome of a process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Communication Plan

A

Provides direction on how to communicate issues related to an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tabletop Exercise

A

A discussion-based exercise where participants sit around a table and talk through one or more scenarios, such as a cyberattack or a natural disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

nmap

A

Network scanning tool for discovering hosts, services, and network information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

openssl

A

Open-source library for secure communication and cryptographic protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

grep

A

Command-line utility for searching text or patterns within files using regular expressions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

curl

A

Command-line tool for transferring data with URLs, supporting various protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Head

A

Beginning or top part of a file or data stream, often used to display initial content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tail

A

Command-line utility displaying the last part of a file or data stream, often used for real-time log monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scanless

A

command-line utility to perform port scans without active probing, aiming to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reconstitution

A

Process of restoring systems/data to their original/functional state after a disruption or incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Precursors

A

Early indicators or warning signs preceding an event, used in identifying potential threats or vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tracert

A

Command-line tool tracing data packet routes from source to destination, showing intermediate hops and response times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

netstat

A

Command-line utility displaying network connections, routing tables, and interface statistics on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

dig

A

Command-line tool querying DNS servers for domain information, IP addresses, DNS records, and name servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

netcat

A

Command-line networking utility establishing TCP/UDP connections, sending/receiving data, and performing port scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

hping

A

Command-line utility for network packet manipulation and analysis, including sending custom packets like TCP, UDP, and ICMP packets from scratch and sending ping request with TCP, UDP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ipconfig/ifconfig

A

ipconfig-Displays network configuration information.
ifconfig-Displays and configures network interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ping

A

Sends echo requests to a designated machine to determine if communication is possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

netcat

A

Command-line utility for networking tasks such as creating TCP or UDP connections, port scanning, transferring files, and debugging network protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ARP command

A

Allows a system administrator the ability to see and manipulate the ARP cache on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cuckoo

A

A sandbox used for malware analysis

25
Q

Dnsenum

A

Command-line utility for DNS enumeration and information gathering, including querying DNS records, identifying subdomains, and discovering DNS zone transfers.

26
Q

route

A

Command-line utility to provide information on current routing parameters. Used to view and manipulate the IP routing table

27
Q

Sn1per

A

an automated scanner designed to collect a large amount of information while scanning for vulnerabilities.

28
Q

chmod

A

A Linux command used to change access permissions of a file.

29
Q

logger

A

Command-line utility for logging messages to system logs, allowing users to record events, errors, and informational messages for troubleshooting and monitoring purposes.

30
Q

PowerShell

A

Microsoft Windows-based task automation and configuration management framework, consisting of a command-line shell and scripting language.

31
Q

dd

A

Data Dump
Command-line utility for data duplication, conversion, and manipulation, commonly used for creating disk images, copying data between devices, and performing low-level data operations.

32
Q

WinHex

A

Software for hexadecimal editing, disk editing, and data recovery on Windows systems, offering tools for analyzing and manipulating binary data, disk structures, and file systems at a low level.

33
Q

FTK Imager

A

Forensic software for acquiring and analyzing digital evidence, including imaging drives, extracting data, and examining file systems, used in forensic investigations and data recovery tasks.

34
Q

Tcpreplay

A

As a suite, tcpreplay is a group of free, open source utilities for editing and replaying previously captured network traffic.
As a tool, it specifically replays a PCAP file on a network.

35
Q

tcpdump

A

Command-line packet analyzer for capturing and displaying network packets in real time, enabling users to monitor network traffic, filter packets based on criteria, and troubleshoot network issues.

36
Q

theHarvester

A

A useful tool for exploring what is publicly available about your organization on the web such as it can provide information on employees, e-mails, and subdomains. It performs open source intelligence (OSINT) gathering to help determine
a domain’s external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using multiple public resources

37
Q

Preparation

A

The phase of incident response that occurs before a specific incident.

38
Q

Identification

A

isthe process where a team member suspects that a problem is bigger than an isolated incident and notifies the incident response team for further investigation.

39
Q

Containment

A

The set of actions taken to constrain the incident to a minimal number of machines.

40
Q

Recovery

A

is the process of returning the asset into the business function and restoring normal business operations.

41
Q

Eradication

A

Involves removing the problem, and in today’s complex system environment, this may mean rebuilding a clean machine.

42
Q

Lessons learned

A

document what went wrong and allowed the incident to occur in the first place. Then examine the incident response process itself.

43
Q

Walkthroughs

A

Examine the actual steps that take place associated with a process, procedure, or event.

44
Q

Simulations

A

Allow personnel to go through the actual steps of an exercise but to perform response and recovery steps rather than just talk about them.

45
Q

MITRE ATT&CK framework

A

A comprehensive matrix of attack elements, including the tactics and techniques used by attackers on a system.

46
Q

Diamond Model of Intrusion Analysis

A

A cognitive model used by the threat intelligence community to describe a specific event

47
Q

Cyber Kill Chain

A

A framework used to defend against the chain of events an attacker takes, from the beginning of an attack to the end of an attack.

48
Q

DRP

A

Disaster Recovery Plan
The data and resources necessary, and the steps required to restore critical organizational processes.

49
Q

BCP

A

Business Continuity Plan
Describes what is needed in order for the business to continue to operate

50
Q

Data retention policy

A

Identifies how long data is retained, and sometimes specifies where it is stored.

51
Q

Sensors

A

Agents placed on systems throughout a network to collect logs from devices and send these logs to the SIEM system.

52
Q

Metadata

A

Data about data instead of the data itself; Information that describes other data.

53
Q

NetFlow

A

A feature available on many routers and switches that can collect IP traffic statistics and send them to a NetFlow collector. Useful for intrusions.

54
Q

Protocol analyzer

A

A piece of software or an integrated software/hardware system that can capture and decode network traffic.

55
Q

Dump files

A

are copies of what was in memory at a point in time—typically a point when some failure occurred

56
Q

The Session Initiation Protocol (SIP)

A

A text-based protocol used for signaling voice, video, and messaging applications over IP.
UDP port 5060

57
Q

Syslog

A

System Logging Protocol
A standard protocol used in Linux systems to send system log or event messages to a specific server, called a syslog server.

58
Q

Journalctl

A

The command to examine logs on a server.

59
Q

Non-repudiation

A

A situation where a statement’s author cannot successfully dispute its authorship or the validity of an associated contract.