Exam 1 Flashcards

(51 cards)

1
Q

Process of Auditing A Network or Application for Known Exploits

A

Vulnerability Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Control Designed to Physically or Logically restrict unauthorized access

A

Preventative Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Method of Assessing the Security of Systems available to an insider

A

Credentialed Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preventing an incident from spreading to other areas

A

Containment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The art of making a message difficult to understand

A

Ohdufucation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The only truly unbreakable encryption mechanism

A

One-Time Pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Document that shows a red team has obtained permission to perform a penetration test

A

Personal Letter of authorization - Get out of jail free card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Property that an encryption key should not be derivable from the ciphertext

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Control Designed to discourage an attacker from attempting an attack

A

Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Action taken to reduce the likelihood of a threat occuring

A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Completely removing the cause of an incident

A

eradication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Process of returning to normal operations following and incident

A

Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security principle that states data should only be modified by authorized individuals

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control designed to identify and record any attempted intrusions

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Property that predictable features of the plaintext should not be evident in the ciphertext

A

Difusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Limits established for security assessments

A

Rules of engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Goal of ensuring that someone cannot deny sending or creating certain data

A

Non Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security tool used to lure attackers away from actual network systems

A

Honey Pot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Documents that detail requirements for protecting technology and information assets

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Member of an incident response team who initially takes charge

A

First Responder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Method of Isolating a particular system or network for analysis following an incident

A

Quarantine - Sandboxing

22
Q

Obtaining access to an it manager’s credentials after compromising another employee

A

Escalation of Privelages

23
Q

Control that restores the function of the system through some other means

24
Q

Implementing security controls at various levels

A

Defense in Depth or Layered Security

25
Control responds to and fixes an incident any may also prevent its recurrence
Corrective Control
26
Specific method for establishing a shared secret across an insecure channel (a method of securely exchanging cryptographic keys over a public channel)
Diffle-Hellman Merkle
27
Tactic to obtain someone's credentials through observations
Shoulder Surfing
28
Obtaining information from publicly available sources
Opensource Intelligence
29
A form of malicious code that appears to perform one service, but also hides another purpose
Trojan Horse
30
Intercepting and logging traffic that passes over a network
Packet Sniffing
31
Malicious code that enables administrator-level access to a computer or network
RootKits
32
A hidden method used to gain access to a computer system; Sometimes used by software developers
Backdoors
33
Failing to shred documents leaves them vulnerable to this type of attack
Dumpster diving
34
Common motivations and intents can be used to group attacker into these
Threat Actors
35
Path or tool used to exploit a vulnerability
Threat Vector
36
Used by attacker to discover unprotected wireless networks
War Driving
37
Error in establishing or maintaining a security control
Misconfiguration
38
Method of entering a secured area without authorization
Tailgating - Piggy Backing
39
Hactivists are known for employing this type of attack
Denial of Service
40
Replaying and spoofing packets would be classified as this
Injection
41
A form of malicious code that is triggered by a specific event or condition
Logic Bomb
42
Technique used to determine what is running on a particular system
Service Discovery or Fingerprinting
43
Technique used to convince Burger King workers to break the windows of the restaurant
Intimidation
44
Utility to show network information, such as active connection and routing tables
Netstat
45
Claiming someone has given you permission
Authority
46
Most challenging type of Threat Actor
Malicious Insider
47
An arbitrary 24-bit number used along with a secret key for data wep encryption
Initialization Vector
48
Malware capable of stealing typed credentials
Keylogger
49
Attacker's ability to obtain, maintain, and diversify access
Advanced persistent threat
50
Specific setting to listen to all nearby wireless traffic
Promiscuous Mode
51
Research activity that involves running specific queries
Google Hacking