Incorrect Domains Flashcards

1
Q

Worms

A

“Replicate” and “Spread”

.12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fileless Scripts

A

executing malicious activity while legit programs run.

Memory based not file based

1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logic Bomb

A

if discovered its already too late

1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rootkit

A
  • Distributed privilege access for a remote user which gives them admin privileges

1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rainbow Table

A

Rebuilt set of hashes used to crack a password

1.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Salting

A

adding additional random data to the password to prevent rainbow table

1.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Skimming

A

attaching a fake scanner to a POS system

1.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Criminal Syndicates

A

Financial backing and a structure threat conducted over a long period of time

1.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shadow IT

A

The use of IT, devices and sopftware without explicit IT department approval, often done with good intentions

1.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adversaries

A

government funded agencies

1.7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bulletins

A

released by vendors or private companies

1.7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

False Negative

A

When there is a vulnerability, but the scanner does not detect it

1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Credentialed scan

A

spots vulnerabilities like non expiring passwords

1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True Positive

A

results of the system scan agree with the manual inspection

1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

non credentialed scan

A

Lower privileges than a credentialed scan. find missing patches and some protocol vulnerabilities

1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intrusive Scan

A

try to exploit vulnerability and should be done in a sandbox

1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SIEM

A

Security Information Event Management

provides real time monitoring, analysis, correlation and notification of potential attacks

Built in log collector like syslog
1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SOAR

A

centralized alert and response automation with threat specific playbooks

1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dashboard

A

SIEM typically includes a dashboard and collects reports that can be reviewed regularly to ensure that the polices have been enforced and the environment is compliant

1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

UEBA

A

User Entity Behavior Analysis

based on the interaction of the user that focuses on their identity data that they would normally access on a normal day

Tracks devices that the user normally uses and the servers that they normally visit

1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pivoting

A

a compromised system is used to attack another system on the same network

1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IaaS

A

Cloud Service Provider responsible for

  • Virtualization
  • Servers
  • Storage
  • Networking

Ex. Azure Virutal Machines

2.2 Summarize Virtualization and Cloud Computing Concepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PaaS

A

Cloud Service Provider responsible for

  • Virtualization
  • Servers
  • Storage
  • Networking
  • OS
  • Middleware
  • Runtime

Customer is responsible for deployment and management of apps

CSP manages provisioning of configuration, hardware, and OS

Ex. Azure SQL database, API management

2.2 Summarize Virtualization and Cloud Computing Concepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SaaS

A

Cloud Service Provider responsible for

  • Virtualization
  • Servers
  • Storage
  • Networking
  • OS
  • Middleware
  • Runtime

Customer just configures features. Limited shared responsibility for Applications and Data

CSP responsible for management, operation, and service availability

Office365, SalesForce

2.2 Summarize Virtualization and Cloud Computing Concepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Containerization
a lightweight, granular and portable way to package applications for multiple platforms 2.2 Summarize Virtualization and Cloud Computing Concepts
26
IaC
Infrastructure as Code management of infrastructure (networks, VM, load balancers and topology) described in code Used in conjunction with continuous integration and continuous delivery 2.2 Summarize Virtualization and Cloud Computing Concepts
27
SDN
Sofware Defined Networks Network controlled using software. Separating the control plane from the data plane opens up security challenges that can include a DoS or Man in the middle attack 2.2 Summarize Virtualization and Cloud Computing Concepts
28
Smart Card
a credit card sized token that contains a certificate and is used for authentication in conjuction with a pin 2.4 Summarize authentication and authorization design concepts
29
Attestation
the process of confirming the device is an approved device compliant with the company policies. Remote attestation involves checks that occur on a local device and are reported to a verification server (as with an MDM solution) 2.4 Summarize authentication and authorization design concepts
30
Directory Services
used to store and manage information about objects, such as user accounts, mail accounts and information on resources. LDAP is a common one 2.4 Summarize authentication and authorization design concepts
31
Federation
collection of domains that have established trust 2.4 Summarize authentication and authorization design concepts
32
something you have
trusted device
32
Something you know
pin or password
33
something you are
biometric
34
RADIUS
uses UDP and ecnrypts the password only 2.4 Summarize authentication and authorization design concepts
35
TACACS+
Uses TCP and encrypts the entire password 2.4 Summarize authentication and authorization design concepts
36
RAID Levels
increases performance of data storage with two or more drives working in Parallel RAID 0 - striping RAID 1 - mirroring RAID 5 - striping with parity RAID 6 - striping with double parity RAID 10 - combining mirroring and striping 2.5 Implement Security Resilience
37
Load Balancers
balances traffic across multiple servers, often used for web traffic 2.5 Implement Security Resilience
38
Storage Area Network (SAN)
hardware device that contains large number of disks, such as SSDs, usually isolated from the LAN 2.5 Implement Security Resilience
39
RTO
Maximum amount of time that a process or service is allowed to be down 2.5 Implement Security Resilience
40
RPO
Point of last known good data prior to an outage that is used to recover systems. Time that can pass before loss exceeds maximum tolerance 2.5 Implement Security Resilience
41
Non Repudiation
The sender cannot deny sending the message 2.8 basics of cryptographic concepts
42
Hashing
one way function that scrambles plain text to produce a unique message. No way to reverse if properly designed Verify of digital signature generate random numbers 2.8 basics of cryptographic concepts
43
Steganography
A computer file, message, image or video is concealed with another file, message or video. attacker may hide info this way to exfiltrate data 2.8 basics of cryptographic concepts
44
ECC
Elliptic Curve Cryptograpghy small, fast key that is used for mobile device encryption Lower power devices often uses ECC 2.8 basics of cryptographic concepts
45
Low Latency
Encryption and decryption should not take a long time. Specialized encyrption hardware is a common answer in this scenario 2.8 basics of cryptographic concepts
46
3.1 Implement Secure Protocols
47
IPsec
Secure VPN session between two hosts
48
SSL/TLS and HTTPS
Secure data in transit, secure web browsing Port 443
49
LDAPS
Secure directory services information Port 636
50
Remote Desktop Protocol
Secure Remote Access Port 3389
51
Endpoint Detection and Response (EDR)
integrated endpoint security that combines real time continuous monitoring and collects endpoint data with automated responses
52
Next Gen Firewalls (NGFW)
Deep packet inspection firewall that adds application-level inspection intrusion prevention, and brings intelligence from outside the firewall 3.1 Implement Secure Protocols
53
Unified Extensible Firmware Interface (UEFI)
modern version of BIOS that is more secure and needed for a secure boot of the OS
54
Measured Boot
all components from the firmware, apps, and software are measured and information is stored in a log file. The log file is on the TPM chip on the motherboard
55
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Protocol Replaced WEP and TKIP/WPA, now used with WPA2 uses AES Encryption with a 128-bit key
56
WPA3
uses much stronger 256 bit GCMP for encryption
56
Simultaneous Authentication of Equals (SAE)
Used with 802.11 authentication method Used with wpa3 personal and replaced wpa2-PSK immune to offline attacks and protects against brute force attacks
56
EAP
An authentication framework that allows for new technology to be compatible with existing wireless or point to point connection tech
56
802.1x and RADIUS Federation
enables members of one org to authenticate to another with their normal credentials. Trust across multiple raid servers. WAP forwards the devices wireless device credentials to the RADIUS server for authentication
57
Captive Portals
Wifi redirects users to a webpage when they connect to SSID. User provides additional validation of identity, normally through email or social identity
58
Site Survey
walking around with a portable wireless device, taking note of signal strength and mapping it
59
WAP Placement
Want minimal overlap with other WAPS to maximize coverage
60
Geofencing
Geofencing prevents mobile devices from being removed from the company's premises
61
Geotracking
will tell you the location of a stolen device
62
Sideloading
allows unauthorized software to be run on a mobile device
63
Rooting and Jailbreaking
remove the vendor restrictions and allow unsupported software to be installed
64
OCSP
offers a faster way to check a certificate status
65
Code Signing
when code is distributed, users can trust that it was actually produced by the claimed sender
66
Pinning
method designed to mitigate the use of fraudulent certs
67
Key Escrow
Addresses the possibility that a cryptographic key may be lost
68
Nslookup
verifies the IP address of ahostname in the DNS Sever database set type= command change the type of records it searches for
69
nmap
network mapper, good for banner grabbing
70
Hping
packet generator and anayzer used for auditing firewalls and networks
71
Netstat
used to see established connecitons, listening ports, and running services
72
NetFlow
monitors network traffic and helps identify patterns in the network traffic
73
DLP
policy based protection of sensitive data, based on labels or pattern matches
73
NAC
Network Access Control User is authenticated and device checked to confirm patched and complaint before granted access
74
Containing the incident comes before finding the root cause and full remediation
74
Air gap
eliminated all network connectivity and protects the network from an attack
75
Chain of Custody
Tracks the movement of evidence through collection. Documents each person who handled the evidence
76
Order of Volatility
CPU Cache, ARP cache, Data Flows, RAM, Swapfile or pagefile, hard drive
76
GLBA act
services of banks lenders and insurance
77
CSA CCM
Helps potential customers measure the overall risk of a csp
78
Risk Acceptance
Do nothing, accept the risk
79
Risk Appetite/ Risk Tolerance
amount of risk willing to accept
79
Risk Avoidance
cost of mitigating or accepting are higher than the benefits of the service
80
Heat Map
shows the severity of the situation
81
Single Loss Expectancy
How much would it cost if it happened one time
82
Annualize Rate of Occurrence (ARO)
How many times does it happen in one year?
83
Annualized Loss Expentancy (ALE)
How much will you lose per year
84
Single Point of Failure
any non-redundant part of a system that if unavailable, would cause the entire system to fail
85
RPO
age of data that must be recovered from backup storage for normal operation to resume
86
RTO
the duration of time and a service level within which a bvsuiness process must be restored after a disaster to avoid consequences
87
Business Impact Analysis (BIA)
looks at the fiancial loss follwoing a disaster
88
Business Continuity Plan (BCP)
overall org plan for how to continue business. MTTR and MTBF
89
Disaster Recovery Plan (DRP)
the plan for recovering from an IT disaster and having the infastructure back in operation
90
MTTR
time determination for how long it will take for a piece of IT to be repaired and back online
91
MTBF
how long a piece of infrastructure will continue to work before it fails
92
DNS blackholing
a process that uses a list of known domains/IP addresses belonging to malicious hosts and uses an internal DNS server to create a fake reply
93
signature kinetics scan
measures the action of a user when signing their name and compares it against a known-good example or baseline
94
Reverse Proxy
proxy server that appears to any client to be an ordinary web server, but in reality merely acts as an intermediary that forwards the client's requests to one or more ordinary web servers. Directing traffic to internal services if the contents of the traffic comply with the policy