Domain 4 Flashcards

(87 cards)

1
Q

Control

A

High level description of a feature or activity that needs to be addressed and is not specific to a technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Benchmark

A

Contains security recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baseline

A

Implementation of benchmark on individual service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Configuration Management

A

Ensures that systems are configured similarly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Change Management

A

Policy Outlining the procedures for processing changes helps reduce risks associated with changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardening

A

Is a practice of reducing a systems attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unified Endpoint Management

A

Provides management of the hardware, such as desktops, tablets, smartphones, and IOT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile Application Management

A

Allows a security team to manage application and data security, even on unmanaged devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sideloading

A

Enables directly installing an application package in .apk format on a mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rooting/Jailbreaking

A

Rooting and Jailbreaking remove the vendor restrictions on a mobile device to allow unsupported software to be installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wifi Direct

A

Wifi direct wireless network allows 2 wifi devices to connect to each other without requiring a WAP. It is a single path and therefore cannot be used for internet sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adhoc Wireless

A

Where 2 wireless devices can connect without a WAP but it is multipath and can share an internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tehering

A

GPS enabled smartphone can be attached to a laptop or mobile device to provide internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BYOD

A

Employee can bring their own device. Cost effective. AUP and Onboarding and Offboarding policies provide directions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CYOD

A

Chooses from list of approved devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

COPE

A

Company purchases the device and allows the employee to use it for personal use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bluejacking (Annoyance)

A

Pranksters push unsolicited messages to engage or annoy other nearby Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bluesnarfing (data theft)

A

Data theft using Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bluebugging (eavesdropping or hacking)

A

Creates backdoor attack before returning control of the phone to its owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Radio Frequency Identification

A

Uses radio frequency to identify electromagnetic field in a tag to track assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Near Field Communication

A

Built on RFID often used with payment systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

GPS

A

Measure distance between two points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Evil Twin

A

Malicious fake Wireless Access Points set up to appear legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Disassociation

A

Type of DOS attack attacker breaks the wireless connection between the victim device and access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Jamming
A DOS attack that prevents nodes from using the channel to communicate by occupying the channel
26
CCMP
Created to replace WEP. Uses AES128
27
WPA2
An encryption scheme that implemented the CCMP
28
Simultaneous Authentication of Equals (SAE)
Used with WPA3. Protects against brute force. Uses a Diffie Hellman handshake called dragon fly. Immune to offline attacks
29
WPA3
Uses GCMP-256
30
WPA3 Personal
Uses SAE. Users can use passwords that are easier to remember
31
WPA3 Enterprise
Supports 256 bit AES
32
AAA Protocols
Radius and TACACS+
33
Wifi Protected Setup (WPS)
Password is stored locally so could be brute forced
34
IEEE802.1x
Authentication Protocol. Transparent to users because it uses certificate authentication. Can be used in conjunction with a Radius server
35
Radius Federation
Enables members of one organisation to authenticate to another with their normal credentials - Trust is across multiple RADIUS servers
36
EAP (Extensible authentication protocol)
Authentication Framework allows for new authentication technologies to be compatible with existing wireless or point to point connections
37
PEAP (Protected Extensible Authentication protocol)
Encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption
38
LEAP (Lightweight)
CISCO proprietary alternative to WPA and TKIP
39
Input Validation
Ensures buffer overflow, integer overflow and SQL injection attacks cannot be launched. Only accepts data in the correct format within a range of minimum and maximum values
40
Secure Cookies
Used by web browser and contain information about your session. Can be stolen by attackers to carry out a session hijacking attack
41
HTTP headers
Attacker can carry out XSS which is mainly delivered through HTTP response headers
42
Code Signing
Uses a certificate to digitally sign scripts and executables
43
Static Code Analysis
Code is not executed locally. Source code is run inside the tool. Requires access to source code
44
Dynamic Code Analysis
Code is executed and technique is call fuzzing. Outside in. Does not require code access
45
Fuzzing
Random information is input into an application
46
WAF
Protect web applications by filtering and monitoring HTTP/HTTP traffic between a web application and the internet
47
Next Generation Firewalls
Deep packet inspection firewall that moves beyond port/protocol inspection. Adds intrusion prevention, brings intelligence feeds
48
Sandboxing
Application is installed in a virtual machine environment isolated from network
49
Darkweb
Requires specialised software to able to access these private
50
Trusted Automated exchange of Intelligence Information (TAXI)
How Real time cyber threat information can be shared via services and message exchanges
51
Structured Threat Information Expression (STIX)
Defines a common language for expressing cyber threat information
52
Known Environment
Substantial/ Full Information - White Box test
53
Unknown Environment
Completely Blind - Black Box Test
54
Partially Know Environment
Gray baox test - Some information is known
55
Active Reconnaissance
Interacts directly with the target in some way
56
Footprinting
Ethical hacking technique used to gather as much data as possible
57
Passive Reconnaissance
Not integrating with the target
58
Red Team (Offense)
Emulating the tools and techniques of likely attackers
59
Blue Team (Defence)
Defences against both real attackers and Red team
60
Purple Team
Process Improvement - Exist to ensure and maximize the effectiveness of Red and Blue teams
61
Bug Bounty
Monetary Reward given to Ethical Hackers
62
SCAP (Security Content Automation Protocol)
Is a set of open standards that facilitates the automated management of vulnerabilities and security policy compliance. Automation, Standardisation, Improved Accuracy, Compliance
63
SIEM
Security Information Event Management
64
SOAR - Security Orchestration Automation and Response
Centralised alert and response automation with threat specific runbooks
65
User Entity Behaviour Analysis (UEBA)
Based on interaction of a user that focuses on their identity and the data that they would normally access
66
Heuristic Analysis
Analyse files for suspicious characteristics even if they haven't been encountered before
67
SNMP - Simple Network Management Protocol
Monitors and manages network devices such as routers or switches. Can modify device configuration or report status to a management system. Agents installed on devices send info to an SNMP manager through notifications known as SNMP Traps . SNMP3 encrypts credentials
68
Netflow
A feature available on many routers and switches that can collect IP traffic statistics and send the to Netflow collector
69
Firewall
Controls incoming and outgoing network traffic
70
Access Control List
Collection of firewall rules that define what traffic is allowed or denied
71
Transmission Control Protocol (TCP)
Layer 4 of OSI model - Reliable connection for web browsing, file transfer
72
User Datagram Protocol (UDP)
Connectionless protocol used for online gaming, streaming services
73
Internet Control Message Protocol (ICMP)
Used for network. e.g ping
74
Screened Subnet
Boundary layer between Internet and trusted network, Perimeter and DMZ
75
Group Policy
Provides policy based control of windows systems and domain settings through Group Policy Objects (GPO)
76
Authentication Protocol
Mechanism for authentication only
77
Encapsulating Security Payload (ESP)
Provides data confidentiality, Data Integrity, data origin authentication, and replay protection
78
IPSEC Mode - Transport Mode
Outer Header are used to determine the IPsec Policy that will be applied to the packet. It is good for ESP host-to-host traffic
79
IPSEC Mode- Tunnel Mode
2 IP headers are sent
80
DKIM (Domain key Identified Mail)
Acts like a digital signature for email. DKIM verifies message
81
Sender Policy Framework (SPF)
List of authorised mail servers allowed to send emails on behalf of your domain. Acts like a whitelist. SPF verifies Sender
82
DMARC
Combination of DKIM and SPF . Tells receiving mail servers what to do with emails. DMARC has 3 enforcement policies Monitor, Quarantine and Reject. DMARC leverages the information from SPF and DKIM to determine how to handle emails
83
Email Gateway
Acts as a security checkpoint for all incoming and ongoing emails
84
File Integrity Monitoring
Safeguards critical files and system configuration from unauthorised modification
85
Network Access Control (NAC)
86
XDR (Extended detection response)
Provides visibility into endpoints, cloud infrastructure, mobile devices, apps
87
Provisioning