Final 7-12 Flashcards
(87 cards)
What is a United Threat Management device?
A piece of hardware that can do email spam filtering, malware protection, firewall capabilities, and more.
What is an MUA and MTA , what do they do?
Mail User Agent & Mail Transfer Agent. A MUA is what is used to read and send mail from an endpoint (gmail). MTAs are programs that accept email messages from senders and route them toward their recipients.
What is an endpoint?
A network-connected hardware device (phone, computer, tablet)
What products can assist in monitoring endpoint hardware?
An Endpoint Protection Platform (EPP) has antimalware scanning.
Endpoint Detection and Response (EDR)
Detects & investigates security incidents, & the ability to intervene and even remediate endpoints back to a preinfection state.
While identifying software for the presence of malware, how is that done with EPP and EDR?
Reverse engineering malware.
known-good behavior
“Normal” processes and actions used as a standard.
User and Entity Behavior Analytics?
Normal behaviors for users and entities
What is Layer 2 of the OSI model?
Data Link Layer, divides data into packets, handles error detection and correction.
Packet and protocol analysis?
Analyzing packets and the protocols that are used on a network in search of malware.
What is a TAP?
Test Access Point, transmits send and receive data streams simultaneously. Passive device, cannot be attacked. “court approved”
What tools can be used for packet analysis?
Wireshark (gui tool), EtherApe (virtual interpretation), Tcpdump (command-line, UNIX and LINUX), Tcpreplay (editing and replaying packets)
What is the DGA technique?
A domain generation algorithm can be used to create multiple random potential URLs for malware to communicate with a command and control server over.
Nicholas wants to implement an additional feature for the employees at his organization to be able to verify who the sender of the message is and that the message hasn’t been tampered with in transit. What will be required to send the message?
The message hash needs to be encrypted using the sender’s private key. The receiver will decrypt the message hash using the sender’s public key.
What can be added to prevent SQL injection or cross-site scripting attacks?
web application firewall
Jonquil has been asked to implement a system that collects information for analysis about traffic flowing through the routers and switches on her company’s network. What protocol should she consider to implement this type of setup?
NetFlow is a protocol developed by Cisco that collects info about traffic flowing through devices on a network.
What is Data correlation?
Looking for reasons why shit happens in event sequences
What is syslog?
A means by which network devices can use a standard message format to communicate with a logging server.
Suki wants to analyze all of the traffic being sent to and from a group of 10 computers that are all connected to the same networking device. He decides to install a sniffing device that will capture packets and then enable port mirroring on the networking device to send copies of the traffic to the sniffing device. What device is he using?
A switch, he is port mirroring to send copies of frames to a certain port for analysis.
Sanvi is a cybersecurity analyst at her company and has been asked to review a new platform that will combine software programs and tools in order to orchestrate a range of security operations, threat intelligence sources, as well as incident response mechanisms all into one. Which has she been asked to review?
SOAR (Security orchestration, automation, and response) combines software programs and tools in order to orchestrate a range of security options, threat intelligence sources, and incident response mechanisms.
What is data enrichment?
The process of enhancing data for cybersecurity analysis. Combining data from multiple orgs.
What is SCAP?
Security Content Automation Protocol. Open standard that enables an automated vulnerability management, measurement, and policy compliance evaluation.
What are the standards of SCAP?
Common Vulnerabilities and Exposures (CVE)
Common Configuration Enumeration (CCE)
Common Platform Enumeration (CPE)
Common Weakness Enumeration (CWE)
Define the standards of SCAP.
Common Vulnerabilities and Exposures (cve)
Vulnerabilities in operating systems and application software
Common Configuration Enumeration CCE
Configuration best-practice statements
Common Platform Enumeration CPE
Vulnerabilities in operating systems, applications, and hardware devices
Common Weakness Enumeration CWE
Software design flaws that could result in a vulnerability
Clustering?
A form of statistical analysis that separates groups (clusters) of similar data points from a larger set based on specific characteristics.