General Flashcards
(129 cards)
What is in CIA triad
Confidentially
Integrity
Availability
List 6 step incident response
Prepare
Detection and analysis
Containment
Eradication
Recovery
Post incident activity or lessons learned
What are the triple AAA
Stands for accounting, authentication, and authorization
What is MITREs model for post attack techniques called
ATT&CK
adversial tactics , techniques, and common knowledge
List 7 steps of kill chain attack
Recon
Weaponization
Delivery
Exploitation
Installation
Command and control
Actions on objectives
What are the general 5 steps to hacking
Recon
Scanning
Gaining access
maintaining access
Covering tracks
What are 5 steps of pen test
Planning
Scanning
Gaining access
Maintaining access
Analysis & reporting
List examples of substitution ciphers
Rot13, Caesar cipher, and keyword cipher
What is one time pad
It’s unbreakable if properly used. Each person would get copy of pad to encrypt message which was the key
What is symmetric crypto
Uses one key to encrypt and decrypt
Symmetric key crypto uses what two ciphers and how do they encrypt
Block and stream
Block is by bytes while stream is bit at a time
List some symmetric key algorithms
Des,3des, and aes
List popular stream ciphers
RC4, seal, and ORYX
What two keys does asymmetric crypto use
Public and private
List common asymmetric algorithms
RSA, ECC, ECDSA, DSS, el gamal, and diffie hellman
List common hash algorithms
Sha, md5, and RACE
How does a digital signature get made using PKI
First hashed
Encrypted using private key
Receiver uses public key to decrypt
Ocsp versus crl
CRL is list download and checked
While online certificate services protocol checks certificate online to see if valid
What is ocsp stapling
Instead of web browser reaching out to ca. Web server caches response from oscp, and then staples response to certificate sent to client
What are the 5 threat intelligence lifecycle steps
Planning & requirements
Collection and processing
Analysis
Dissemination
Feedback
What are pkcs
Public key cryptographic standards for different uses in PKI infrastructure
What is pkcs 7 used for
Sign or encrypt messages
What is pkcs 10 used for
It’s standard to be used to request certificate from CA
What is pkcs 12 or pfx
File that stores private key, certificate chain, and certificate can be protected by password