CIT Flashcards

1
Q

ClamAV

A

Free open-source cross-platform antivirus software
Mainly CLI tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

False Positive (F/P) Causes

A

Heuristics: AVs evolve and so do viruses
Behavioral Analysis: Legit apps behaving like malicious apps
Machine Learning: Mistakes in training data fed to software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zero Day

A

Undiscovered or newly discovered flaw in a program before the vendor can patch it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are three ways that anti-virus programs discover viruses

A

String/Byte Signatures
Hash Signatures
Heuristic Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Antivirus Bypass Techniques

A

Packing and Encryption
Fileless Attacks
Code Mutation
Disable AV updates
Stealth Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal Firewall

A

Blocks incoming/outgoing connections to/from the workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HIDS/HIPS

A

Host Based Intrusion Detection System
Host Based Intrusion Prevention System
Detects, protects, and alerts upon malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sandbox

A

Restricted environment used to run suspicious programs and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EDR

A

Endpoint Threat Detection and Response
Focuses on detecting and responding to malicious activity on the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

YARA Signature Types

A

Body-Based Signature: looks for specific sequences
Hash-Based Signature: Looks for identical hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

YARA Rules

A

Way of describing a pattern to identify files
Rules written to meet specific conditions
YARA Rule Signature: Max 64 strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Honeypot

A

Decoy devices meant to lure attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeypot Aims

A

Analysis: analyze attacker’s movements and gain insight
Collection: Collect forensic data needed to improve security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeytokens

A

Fake IT resources designed to draw the attacker’s attention.
Typically found in public areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Canary Traps

A

Used to identify internal data leakers. Changes documents slightly and that is traced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MHN

A

Modern Honey Network
Open-source platform for honeypot management
Collects and analyzed honeypot data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Regex

A

Regular Expressions
Method used to describe a specific pattern of characters

18
Q

DLP

A

Data Loss Prevention

19
Q

OpenDLP

A

Free open-source server
Able to concurrently scan thousands of OSs

20
Q

DLP Bypass Techniques

A

Encoding, Ciphering, and Steganography

21
Q

DNS Record

A

Stores info about every site on the web
DNS records tell DNS servers which domain is associated with which IP

22
Q

Mail Protocols

A

SMTP (25): Outgoing mail
POP3 (110): Push mail
IMAP (143): Keep mail on server

23
Q

Email Spoofing

A

Forging email headers to fool recipients into trusting the message

24
Q

DNS Spoofing

A

Creating fake DNS records to redirect traffic to a malicious website

25
SPF
Sender Policy Framework Email authentication protocol Store info about which IPs can send emails from a domain Doesn't work when forwarding emails
26
DKIM
DomainKey Identified Mail Email validation Preformed on server level Uses digital signatures
27
DMARC
Domain-Based Message Authentication, Reporting, and Conformance Fails DMARC check: Monitor, Quarantine, Reject Can generate a report about outgoing emails
28
MTA
Mail Transfer Agent Application side Forwards
29
MDA
Mail Delivery Agent Sorting and delivery
30
SIEM
Security Information and Event Management Detect security incidents early
31
SIEM Workflow
Collection, Parsing, Evaluation, Correlation, Inspection
32
Snort
Open-source IDS/IPS system Can preform real time network traffic analysis
33
Splunk
Search Header: Interface used to search and access data Indexers: Log parsers Small Components: Collect data to be sent to Splunk
34
Pipe & Search
Advanced Syntax Queries Pipe forms a chain of commands Search is used with Pipe to filter the output
35
AS & BY
Advanced Syntax Queries AS renames a column BY groups by field
36
Alert Flow
Log Inspection Rule Definition Rule Testing Fine Tuning Production
37
Aggregation Alerts
Consolidate logs with identical content Detects attacks like brute-force and port scanning
38
Correlation Alerts
Alerts from different events correlated to single event Indicate similar suspicious behavior among various system products
39
SOAR
Security Orchestration Automation Response Designed to reduce need for human intervention
40
SOAR Features
Security Incident Response: Tools that respond to security-related incidents Security Operation Automation: Repetitive tasks can be automated
41
IOT System Components
Edge Components, Smart Gateway, Connectors, Data Processing, User Interface