4.0 Operations and Incident Response Flashcards

(63 cards)

1
Q

a command-line utility that you can use to trace the path that an Internet Protocol (IP) packet takes to its destination.

A

Linux: traceroute domainname

Windows: tracert domainname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Command that lets an Internet server administrator or any computer user enter a host name (for example, “whatis.com”) and find out the corresponding IP address or domain name system (DNS) record

A

Linux: dig domainname

Windows: nslookup domainname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command for Displaying all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings

A

Linux: ifconfig

Windows: ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

program scans the network that a computer is connected to and outputs a list of ports, device names, operating systems, and several other identifiers that help the user understand the details behind their connection status

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

command can be used to send large volumes of TCP traffic at a target while spoofing the source IP address, making it appear random or even originating from a specific user-defined source

A

HPing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

command is a networking tool used for troubleshooting and configuration, that can also serve as a monitoring tool for connections over the network. Both incoming and outgoing connections, routing tables, port listening, and usage statistics are common uses for this command

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a back-end tool that allows for port scanning and port listening

A

netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

analyzing a business network to discover IP addresses and identify relevant information associated with those IP addresses and devices.

A

IP Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

command allows you to make manual entries into the network routing tables.

A

route

Example

route add -net 192.56.76.0 netmask 255.255.255.0 dev eth0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a command-line tool that lets you transmit HTTP requests and receive responses from the command line or a shell script

A

curl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Linux that acts as a wrapper for a variety of search engines and is used to find email accounts, subdomain names, virtual hosts, open ports / banners, and employee names related to a domain from different public sources

A

TheHarvester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities

A

Sn1per

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

automated tool developed in the Python language, which performs port scanning on the target host

A

Scanless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

multithreaded perl script to list DNS information of a domain and to discover non-contiguous ip blocks.

A

Dnsenum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a tool that is used to launch malware in a secure and isolated environment, the idea is the sandbox fools the malware into thinking it has infected a genuine host

A

Cuckoo sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Linux command to used to change the access mode of a file

A

Chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a linux command prints the first lines of one or more files (or piped data) to standard output

A

Head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a linux command which prints the last few number of lines (10 lines by default) of a certain file, then terminates.

A

Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a Linux command used in searching and matching text files contained in the regular expressions

A

grep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

provides an interface to the syslog subroutine, which writes entries to the system log

A

logger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a tool for replaying network traffic from files saved with tcpdump or other tools which write pcap(3) files

A

TCPreplay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

packet analyzer that is launched from the command line. It can be used to analyze network traffic by intercepting and displaying packets that are being created or received by the computer it’s running on. It runs on Linux

A

TCPDump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

basic purpose of this linux command is to transfer data from one drive to another while also making sure that the data itself is not changed

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
used for forensics, data recovery, low-level data processing, and IT security. It allows the user to view files in hexadecimal format
winHex
26
a tool for creating disk images and is absolutely free to use. It was developed by The Access Data Group. It is a tool that helps to preview data and for imaging
FTK Imager
27
are supported software packages that contain reliable exploit modules and other useful features, such as agents used for successful repositioning
Exploitation frameworks
28
recovers passwords using various techniques. The process can involve comparing a list of words to guess passwords or the use of an algorithm to repeatedly guess the password
password crackers
29
the process of irreversibly removing or destroying data stored on a memory device (hard drives, flash memory / SSDs, mobile devices, CDs, and DVDs, etc.) or in hard copy form
Data sanitization
30
A plan that has a set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber attacks against an organization's information systems
incident response plans
31
This is a process for identifying an attack, understanding its severity and prioritizing it, investigating and mitigating the attack, restoring operations, and taking action to ensure it won't recur
incident response process
32
Incident Response Process technique that does the following These are things you would before an attack happens - communication, who gets contacted, what are the phone numbers, etc - resources: documentation, diagrams, base-lines - incident mitigation software - policies to follow
IRP Preparation
33
Incident Response Process technique that does the following This step in the IRP is figuring out the type of attack buffer overflows - anti-virus can identify - host-based monitors detect configuration changes: something is going to happen or is already underway - network traffic flow deviates
IRP Identification
34
This is a incident response process technique for making sure the attack doesn’t get out of hand Techniques you would use - don't leave it alone - sandbox - isolation can sometimes be problematic because some malware will delete itself and other data once it detects is doesn't have an internet connection
IRP Containment
35
Incident Response Process technique that does the following - remove malware - disable breached user accounts - fix vulnerabilities
IRP Eradication
36
Incident response process technique that has: - different ways to detect incidents, due to large amount of data - security incidents are normally complex
IRP Detection
37
Incident Reponse Process technique that is referring to the aftermath: - have it soon after the attack - what happened? - evaluate how incident plans worked - did the precursors help?
IRP Lesson Learned
38
Incident Response process technique to get back to working operation can take months - a phased approach - start with high-value parts
IRP Recovery
39
set of data matrices, and assessment tool developed by this corporation to help organizations understand their security readiness and uncover vulnerabilities in their defenses.
MITRE ATT&CK
40
analysis is an approach employed by several information security professionals to authenticate and track cyber threats.
Diamond Model of Intrusion Analysis
41
a way to understand the sequence of events involved in an external attack on an organization's IT environment.
Cyber Kill chain
42
Palnning effort within individual agencies to ensure they can continue to perform their mission essential functions during a wide range of emergencies
continuity of operations planning
43
signaling protocol that enables the Voice Over Internet Protocol (VoIP) by defining the messages sent between endpoints and managing the actual elements of a call
Session Initiation Protocol
44
a protocol that computer systems use to send event data logs to a central location for storage
syslog/rsyslog/syslog-ng
45
Linux command for querying and displaying logs from journald, systemd's logging service
journalctl
46
open source log collection tool and centralization tool that offers log processing features, including log enrichment (parsing, filtering, and conversion) and log forwarding
NXLog
47
standard for monitoring network flow data allows you to monitor IP network traffic information as data packets enter or exit an interface.
Netflow
48
provides a more comprehensive picture of network traffic, because it includes the full packet header, from which any field can be extracted
SFlow
49
works with Cisco equipment To do so, collects data packets from across the network
IPFix
50
used to monitor data traffic and analyze captured signals as they travel across communication channels
Protocol analyzer output
51
automate, control, and secure administrative policies on laptops, smartphones, tablets, or any other device connected to an organization's network.
Mobile Device Management
52
SOAR technique consists of a series of conditional steps to perform actions, such as data enrichment, threat containment, and sending notifications, automatically as part of the incident response or security operations process.
SOAR Runbook
53
SOAR technique designed to help SOC teams respond to known threats because security breaches are not typically the result of unknown threats
Soar playbook
54
the process by which organizations preserve potentially relevant information when litigation is pending or reasonably anticipated
Legal Hold
55
the sequence or order in which the digital evidence is collected.
order of volatility
56
A piece of evidence, such as text or a reference to a resource, that is submitted to support a response to a question.
Artifacts
57
entitles your organization to review your vendor's work product and reporting which may include self-assessments, third-party audits and other, official documents detailing the sufficiency of internal systems and controls
right-to-audit clauses
58
any government or governmental unit which has authority to regulate the sale or use of a Co-Development Product in any territory
Regulatory/jurisdiction
59
A mathematical value created using a cryptographic algorithm that is assigned to data and later used to test the data to verify that the data has not changed
checksum
60
form of digital investigation that attempts to find evidence in email, business communications and other data that could be used in litigation or criminal proceedings
e-discovery
61
What are the six steps in the incident response process?
Preparation Detection Analysis Containment Eradication Recovery Lesson Learn
62
A model standard describes malicious activity and enables intrusion analysis, threat hunting, and threat detection.
Diamond Model Intrusion Analysis
63
Name the four diamond model intrusion analysis
Adversary , Capability , Infrastructure and Victim