Intro Flashcards

(42 cards)

1
Q

Which of the following is a common security issue in Linux systems?

A

Weak passwords, excessive superuser privileges, and vulnerabilities like unintended flaws that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which control enables the creation of rules that allow or block traffic?

A

iptables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define OWASP?

A

Open Web Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does cd mean in Linux?

A

Change Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does mkdir mean in Linux?

A

Make Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of network is the internet considered to be?

A

WAN (Wide Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of attack involves sniffing data between two or more computers?

A

On-Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kali Linux is used for penetration testing? T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reviewing systems for possible weaknesses is called?

A

Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What items are involved in risk calculations?

A

Threat, Asset, Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a type of antivirus?

A

ClamAV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which part of the CIA triad ensures that data hasn’t changed in transit?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The primary use for the NMAP tool is to scan network computers? T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of team would a SOC analyst belong to?

A

Blue team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which government agency is part of DHS? (Department of Homeland Security)

A

CISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tool can be used for password cracking?

A

Hydra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OWASP is a government agency? T/F

18
Q

Multiple controls to protect an asset is called?

A

Defense in depth

19
Q

SSDLC involves?

20
Q

SSDLC means?

A

Secure Software Development Life Cycle

21
Q

Testing of code for constant improvement is called?

22
Q

How would you “harden” a Linux server?

A

Remove unnecessary services

23
Q

What does a firewall do?

A

Inspects and filters incoming traffic

24
Q

What type of attack is based on a vendor’s vulnerable equipment?

25
The primary purpose of a router is?
Allows separate networks to communicate
26
What is one of the leading causes of KNOWN vulnerabilities being exploited?
Poor patch management
27
The most powerful account in Linux is?
Root
28
A VPN is used to secure data at rest? T/F
False
29
Which regulation involves software for medical use?
HIPAA
30
HIPAA means?
Healthcare Insurance Portability and Accountability Act
31
What does DLP stand for?
Data Loss Prevention
32
With proper planning, all vulnerabilities can be eliminated? T/F
False
33
When hackers exploit a new software vulnerability it is known as?
Zero-day
34
What is network segmentation?
Dividing the network into multiple zones
35
SQL injection involves?
A website, A database
36
How can you mitigate XSS and SQL injection attacks?
Input validation
37
NIST is a reliable place to find vulnerability information? T/F
True
38
A standard is an agreed upon method used for risk management? T/F
True
39
Can firewall be physical?
Yes through data centers
40
CIA meaning?
Confidentiality, Integrity, Availability
41
Is Linux open or closed source?
Open source
42
DDOS meaning?
Distributed Denial of Service