General Flashcards

(159 cards)

1
Q

Denies all traffic implicitly then allows based on rules.

A

Restrictive Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compares one packet at a time against rule set

A

Stateless Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maintains a state table of traffic connections and flows

A

Stateful firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provides advanced malware protection and cloud participation

A

NGFW (Next Generation Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uses traditional ACLS and inspects rules applied to interfaces

A

Classic firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permits all traffic implicitly and then denies based on rules

A

Permissive firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

[Hijacking and Session Hijacking Attacks]

Cross-Site Scripting (XSS)

A

Affects hosts and web applications

Vulnerable website (injection attack)

Client browser trusts

Goal is to access personal info (session cookies)

User does not have to be authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

[Hijacking and Session Hijacking Attacks]

Cross-Site Request Forgery (XSRF)

A

Attempt to force use to executive unwanted actions on a web app

Targets ‘state changing’ request (ie transferring funds, changing an email address, etc…)

Usually involves social engineering (sending link via chat or email)

Requires that the user to already be authenticated, credential are present in the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[Public Key Infrastructure (PKI) Components

Certificate Revocation List (CRL)

A

Digital certificates can be revoked before they are set to expire

Main reason for for revoking a certificate:
Key compromise (44%)
Company ceased operations (26%)

A CRL contains a list of certificate serial numbers that have been issued by the CA and then revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which specific type of malware often targets the BIOS, boot loader, kernel, or system files, and is difficult to detect since it is often initiates before the operating system has fully booted

A

Root kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What category of malware can be actually be an entire operating system, smart device, gaming system, or even an automobile?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which statement is false about key loggers?

A

False: They can all evade special on-screen keyboard software.

True: They can also be used to study human-computer collaboration

They are used by spyware to capture passwords and credits card input.

They are also used to track employees or family members to adhere to acceptable use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of virus simultaneously attacks the boot sector and executable files so that it combines the characteristics of file infector and boot sector viruses?

A

Multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function that Bots and Botnets do not perform

A

Do not: Corrupt routing tables

Do: Exfiltrate data
Scan memory
Log keystrokes
Mine cyber currency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When searching the Common Vulnerabilities and Exposures (CVE) list’s National Vulnerabilities Data (NVD), what scoring information is provided for each vulnerability?

A

Exploitability Subscore
CVSS Base Score
Impact Subscore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement is not true concerning malware worms?

A

Not true: a worm usually spreads with user action and distributes throughout a single system kernel, components, and processes.

True: it is a special form of self-replicating virus

Classic example are Sasser, ILOVEYOU, Conflicker, and Stuxnet

A worm can consume resources, infiltrate data, or simply cause the CPU to waste cycles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which one is not likely to be a common ransomware vector?

A

Not likely: Digitally signed upgrade

Likely: Powershell file
Infected website
Word macro
Archive file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which is a specific form of malware, often part of multistage exploits, that is known for creating back doors to C&C (Command & Control) servers giving crackers access to a system?

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is it called when cryptomalware is delivered when a user innocently visits an infected website and downloads and installs it without their knowledge?

A

Drive-by

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What team describes the malware that bundles up different type of malicious code into a single package and delivers it in am email attachment?

A

Polymorphic packer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which specific form of malicious software is often used to generate a covert channel so that the remote attacker can access and control the system even on phones and other mobile devices?

A

Back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following my expose you organization or a user to exploits?

A

Ransomware
Poor database RBAC
Hackivism
Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which statement is true concerning resources exhaustion?

A

It is an attack on availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False

All architecture and design methodologies have weaknesses and vulnerabilities?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Used to access database, run batch jobs, or execute scripts
Application
26
These are sometimes referred to as “break glass” accounts
Emergency
27
Gives privileged access across all workstations and servers in a Windows domain
Domain Administrator
28
Typically privileged local or domain accounts that are used by an application or service to interact with the operating system?
Service
29
Commonly grants elevated access to infrastructure devices on an enterprise network.
Privileged user
30
Provides root access to a local host in order for IT staff to perform maintenance
Local Administrative
31
Which scenario is often related to synchronization errors on software code where malicious users can gain unauthorized access to a system or application
Race conditions
32
Which statement is false concerning programs for training end users in security awareness?
False: The first step in the program is to motivate management. True: The AUP is an important aspect policy It helps to offer incentives for keeping a secure environment BYOD has complicated the issue of security awareness
33
Which statement is not true regarding certificate and key management?
Not true: Choose AAA or CRL over OCSP for revocation True: Log all issuances and validation checking activities Validate certificate chains Use a fully-tested enterprise CA
34
During vulnerabilities scanning, you have discovered improper error handling on your internet web servers where detailed internal error messages are being exposed to unauthorized users to improper input handling or error handling. Which statement would not be true on this scenario?
Not true: SQL injection can be exposed True: Stack traces can be exposed Database dumps can be exposed Error codes can be exposed
35
Which would not be considered a vulnerable business process?
Would not: Using TLS and Suite B infected of SSL and IKEV1 Would be: Deploying self signed certificates Lack of front-ended/back-ended cryptosystems on DMZ servers Decoding against cyber insurance riders Not fully vetting cloud and security providers
36
Which technology tries to control the use, modification, and distribution of copyrighted software and multimedia content?
DPM
37
Which tool serves as a memory scraper and a keystroke logger
PoSeidon
38
At which site can you find the Security Policy Project and the CIS Critical Security Controls as a free resource?
Sans.org
39
What function as an extension of IEEE 802.1X?
MACsec
40
Which statement are true regarding system misconfiguration
Human error is the number one vulnerability Coding files should be stored in a secure document library Configuration should first be tested in virtual lab
41
What are the characteristics of IPSec?
Main protocols are ESP and AH Operates in transport or tunnel mode Open frame work that supports Suite B and GET Provides for confidentiality and anti-replay services
42
The Cisco ASA 5585-X is a dominant security appliance in the speciality platform category? True or False
True
43
Which information devices would most likely connect to a printer in the supply room at your office?
Access switch.
44
Wireless Access Points typically create wireless LANs at which layers of the OSI model?
1 & 2
45
Which option is not a dynamic routing protocol?
Not: NAT Is: OSPF EIGRP RIPV2 BGP
46
Which service can perform anti-spam, anti-virus, encryption, DLP, and more in your enterprise?
Mail gateway
47
Which network services provides logs collections, analysis, and forensics?
SIEM
48
Which service can be integrated into web security and email security solutions to be scan e-mail, IM, SMS, and webmail, for the presence of protected and sensitive corporation data?
DLP
49
Which proxy service would best be used for PAT, business logic, and XML purpose in the enterprise?
Translation proxy
50
Which technology can translate and convert media streams between different technologies such as SS7, 4G, LTE, networks, and PBX systems?
Media gateways
51
What is the scenario called when there is illegal usage of bit torrents for download pirated software into your corporate LAN, and the IPS sensor fails to alert you or block the traffic?
False Negative
52
Which Cisco industry controls access to enterprise resources and restricts the lateral movement of threats with micro segmentation?
NAC
53
An encryption gateway can not function on a single device between both an IPSec site-to-site VPN and a remote- access TLS VPN Select if the statement is true or false.
False
54
Which type of event leads the logic bombs to trigger an exploit?
A number of times code executes. A particular date and time Mouse movements On a popular holiday
55
What term describes a seemingly benign JPEG picture that may actually contain destructive malware?
Stegomalware
56
Trojan horse malware masquerades as a legitimate program. What are the common examples of Trojan applications
Shareware utilities Devices drivers Freeware from P2P sites Games
57
Use of Open-Source Intelligence
Intelligence data collected from public sources Third party / legitimate ways Open source threat intelligence
58
Major source of open source feeds.
Information Sharing and Analysis Organization (ISAOs) Information Sharing Analysis Centers (ISACs)
59
Data execution prevention applies to which option?
Memory
60
Which removable media option is triggered when the device is plugged in?
Auto play
61
Users complain in the morning that an application that worked the day before no longer runs without crashing. What is the most likely cause of the problem?
Update history.
62
RAT
Remote Access Trojan
63
Remote Access Trojan (RAT)
Masquerades as a different type of program than a Trojan, but rather than directly damaging the target, it opens a back door, exposing the computer to other threats, such as a keylogger.
64
Trojan Horse
Is a program that appears to be one thing, but is actually something else. The Trojan horse contains a malicious application and is often data destructive. Examples include programs at delete the file allocation table from a hard disk, delete disk partition, delete or overwrite data, or operating system files, and so forth.
65
Logic bomb
Is a type of malware that is designed to attack a computer system based on a specific event, such as a calendar date.
66
PII
Personally Identifiable Information
67
ICMP
Internet Control Message Protocol (ICMP)
68
NFC
Near Field Communication Is a technology that allows devices that have a NFC chip to communicate over very small distances
69
MDM
Mobile Device Management
70
NAC
Network Access Control
71
NAC
Provides the service required and integrates network interconnection devices such as switches, routers, and firewalls. NAC can provide pre-admission security checks, post-admission controls, updates and corrections to client computers through automated remediation.
72
TPM
Trusted Platform Module
73
TPM
Is dedicated microprocessor used for securing computing hardware and providing crypto graphics support. One of the most common uses for TPM is to provide full-disk encryption usually with an external key or passcode used for decryption.
74
TLS
Transport Layer Service
75
TLS
Is a protocol that sends encrypted data use Hypertext Transfer Protocol over Secure Sockets Layers (SSL). HTTPS uses TCP 443 to transmit data.
76
SEH
Structured Exception Handler
77
SEH
Is a Microsoft-specific mechanism.
78
CVS
Concurrent Versions System
79
CVS
Is used by developers to keep track of different versions of source code and manage large projects
80
ASLR
Address Space Layout Randomization
81
ASLR
Can be used by developers t prevent a memory-based attack
82
DEP
Data Execution Prevention
83
DEP
Stops malicious code by performing additional memory checks
84
MFD
Multi-function devices
85
MFD
Combines different features, including printing, scanning, and (usually) faxing.
86
HSM
Hardware Security Module
87
HSM
Is a physical network device that provides for key generations, as well as key storage and management, as a stand-alone device
88
PKI
Public Key Infrastructure
89
CA
Certificate Authorities
90
CAB
Change Advisory Board
91
CAB
Is defined as a group of people who can approve and evaluate a change that has to be deployed
92
SCADA
Supervisory Control And Data Acquisition
93
EAP
Extensible Authentication Protocol
94
EAP
Supports various types of Authentication
95
Kerberos port
88
96
RADIUS port
1812
97
SAML port
443
98
TACACS+ port
49
99
Kerberos
Is an open standard for authentication. Features: Native support for smart card logon Mutual authentication Delegation of authentication
100
VPN
Virtual Private Network
101
MFA
Multi Factor Authentication and single-sign on
102
OTP
One-Time Password
103
PIN
Personal Identification Number
104
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
105
PPP
Point to Point Protocol
106
CHAP
Challenge Handshake Authentication Protocol
107
OAUTH
Open Authorization
108
SAML
Security Assertions Markup Language
109
PAP
Password Authentication Protocol
110
SLIP
Serial Line Internet Protocol
111
TACACS+
Terminal Access Controller Access-Control System Plus
112
TACACS+
Standard and is used with routers, switches, and other devices to provide authentication, authorization, and accounting support
113
PAP
Is typically only used with non-Windows legacy operations systems that do not support password encryption.
114
OAUTH
Is an open source implementation based on the SAML
115
POLP
Principle of Least Privilege
116
POLP
Is minimum rights are assigned for a task to be accomplished.
117
Core principles of the Agile approach to software development are:
Team engagement and collaboration Change-orientated projects Interactions between develops and self-organized, informal teams Continuous integrations to enhance the development process of applications The division of projects into small tasks and stage
118
AS
Authentication Server
119
TGT
Ticket Granting Ticket
120
TOPT
Time Based One Time Password
121
TOPT
Is a password that is generated from a shared key and the current time stamp.
122
HOTP
HMAC-based One Time Password
123
HOTP
Is based on a shared key and an incrementing counter instead of a time stamp
124
PIV
Personal Identity Verification
125
CAC
Common Access Card
126
AUP
Acceptable Use Policy
127
AUP
Is a set of terms that define what users can and cannot do
128
BPA
Business Partner Agreement
129
BPA
Is used to establish a relationship between business partners
130
SLA
Service Level Agreement
131
SLA
Defines performance expectations and describes expected levels of service. Examples uptime and response times
132
MoU
Memorandum of Understanding
133
MoU
Letter of intent. As a formal agreement between two or more parties confirming their intentions and common goals
134
PII include
Full name SSN Full Address Credit card and account number Biometric information Personal Phone Numbers
135
Linkable information
Post code Date of Birth Gender Salary information IP address
136
ALE
Annual Loss Expectancy
137
ALE formula is?
ALE= SLE * ARO
138
SLE
Single Loss Expectancy
139
ARO
Annual Rate of Occurrence
140
Six main phases of incident response
Preparation Identification Containment Eradication Recovery Lesson learned
141
Preparation?
A company creates an incident response policy and trains the whole team to use it.
142
Identification?
Focus on the actual incident and describes hot to make a back up of suspected disk, record evidence, and verify affected systems
143
Containment?
Focus on limiting scope of the issue by protecting critical systems and shutting down services if necessary
144
Eradication?
Is the process of removing the threat or issue that ya been identified.
145
Recovery?
Fully operational system
146
Lesson Learned?
Response team focuses on and documents the cost of the incident, recommendations, and communications problems.
147
CTL
Certificate Trust List
148
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system? * Logic bomb * Trojan Horse * Rootkit * Backdoor
Backdoor
149
What is confusion
Output is drastically different from the input. Bits in ciphertext are a result of multiple parts of the key. Use non-linear table to translate data
150
What is Diffusion?
Single input character changes will affect multiple output characters Each input but should change half or more of the ciphertext bits -avalanche effect Makes patterns harder to spot.
151
What is obfuscation?
• Good Making the information difficult to understand Hiding the real information from unwanted eyes Protecting our intellectual property, protection our organization • Bad Hiding a payload to bypass protection systems Concealing malicious code within legitimate code
152
Symmetric uses?
Secret key
153
Asymmetric
Public key
154
Types of Symmetric Algorithms
``` DES 3DES AES RC4 Blowfish/Townfish ```
155
Asymmetric Privacy Algorithm
Encrypt with public key | Decrypt with private key
156
Authentication Asymmetric Algorithm
Encrypt with private key | Decrypt with public key
157
Types of Symmetric Algorithms
``` DES 3DES AES RC4 Blowfish/Townfish ```
158
Asymmetric Algorithm Types
``` Diffie-Hellman RSA DSA Elliptic curve PGP/GPG ```
159
Key stretching types
BCRYPT PBKDF2