Intro Flashcards

1
Q

Which of the following is a common security issue in Linux systems?

A

Weak passwords, excessive superuser privileges, and vulnerabilities like unintended flaws that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which control enables the creation of rules that allow or block traffic?

A

iptables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define OWASP?

A

Open Web Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does cd mean in Linux?

A

Change Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does mkdir mean in Linux?

A

Make Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of network is the internet considered to be?

A

WAN (Wide Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of attack involves sniffing data between two or more computers?

A

On-Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kali Linux is used for penetration testing? T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reviewing systems for possible weaknesses is called?

A

Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What items are involved in risk calculations?

A

Threat, Asset, Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a type of antivirus?

A

ClamAV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which part of the CIA triad ensures that data hasn’t changed in transit?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The primary use for the NMAP tool is to scan network computers? T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of team would a SOC analyst belong to?

A

Blue team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which government agency is part of DHS? (Department of Homeland Security)

A

CISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tool can be used for password cracking?

A

Hydra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OWASP is a government agency? T/F

A

False

18
Q

Multiple controls to protect an asset is called?

A

Defense in depth

19
Q

SSDLC involves?

A

Applications

20
Q

SSDLC means?

A

Secure Software Development Life Cycle

21
Q

Testing of code for constant improvement is called?

A

Shift left

22
Q

How would you “harden” a Linux server?

A

Remove unnecessary services

23
Q

What does a firewall do?

A

Inspects and filters incoming traffic

24
Q

What type of attack is based on a vendor’s vulnerable equipment?

A

Supply chain

25
Q

The primary purpose of a router is?

A

Allows separate networks to communicate

26
Q

What is one of the leading causes of KNOWN vulnerabilities being exploited?

A

Poor patch management

27
Q

The most powerful account in Linux is?

A

Root

28
Q

A VPN is used to secure data at rest? T/F

A

False

29
Q

Which regulation involves software for medical use?

A

HIPAA

30
Q

HIPAA means?

A

Healthcare Insurance Portability and Accountability Act

31
Q

What does DLP stand for?

A

Data Loss Prevention

32
Q

With proper planning, all vulnerabilities can be eliminated? T/F

A

False

33
Q

When hackers exploit a new software vulnerability it is known as?

A

Zero-day

34
Q

What is network segmentation?

A

Dividing the network into multiple zones

35
Q

SQL injection involves?

A

A website, A database

36
Q

How can you mitigate XSS and SQL injection attacks?

A

Input validation

37
Q

NIST is a reliable place to find vulnerability information? T/F

A

True

38
Q

A standard is an agreed upon method used for risk management? T/F

A

True

39
Q

Can firewall be physical?

A

Yes through data centers

40
Q

CIA meaning?

A

Confidentiality, Integrity, Availability

41
Q

Is Linux open or closed source?

A

Open source

42
Q

DDOS meaning?

A

Distributed Denial of Service