Lesson 3 - Security Assessments Flashcards

1
Q

What is the purpose of using ipconfig?

A

It is the configuration assigned to network interface(s) in Windows and whether the address is static or assigned by DHCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which command should be used to display the local machine’s address resolution protocol cache?

A

arp (Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between tracert and traceroute?

A

Tracert uses ICMP probes to report the round trip time for hops between local host and a host on a remote network.

Traceroute performs route discovery from a Linux host; uses UDP probes by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When there is a need to quickly scan ports, which is the best command to use?

A

-sS, TCP SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the UDP scans (-sU)?

A

Scans UDP ports; can take a long time and can be combined with a TCP scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify the command that can be used to detect the presence of a host on a particular IP address?

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the appropriate methods for packet capture?

A

Wireshark and tcpdump are packet sniffers. A sniffer is a tool that captures packets or frames, moving over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a vulnerability that is exploited before the developer knows about it or can release a patch?

A

Zero Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption vulnerabilities allow unauthorized access to protected data. Which component is subject to brute-force enumeration?

A

A weak cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compare and contrast vulnerability scanning and penetration testing.

A

Vulnerability scanning by eavesdropping is passive, while penetration testing with credentials is active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hosts that hold the most valuable data are not normally able to access external networks directly is…?

A

Pivoting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the differences between a black box, white box, and a gray box penetration test?

A

Black Box - contractor receives no privileged information so they must perform reconnaissance.

White Box - pen tester has complete access and skips reconnaissance.

Gray Box - tester has some, but not all information and requires partial reconnaissance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the different exercise types and their purpose?

A

Red Team - offense
Blue Team - defense
White Team - sets rules of engagement and monitors exercise
Purple Team - red and blue teams meet for debriefs while the exercise is ongoing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is persistence?

A

The tester’s ability to reconnect to the compromised host and use it as a remote access tool (RAT) or backdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote Access Trojan (RAT)

A

Malware that gives an adversary the means of remotely accessing the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the command line client for performing data transfers over many types of protocol?

A

curl

17
Q

What are the main types of security assessment usually classed as?

A

Vulnerability, Assessment, Threat Hunting

18
Q

What is penetration testing and what is it also referred to as?

A

Also referred to as Ethical Hacking.

Authorized hacking to discover exploitable weaknesses in the target’s security systems.

19
Q

Methods and tools by which an attacker transfers data without authorization from the victim’s systems to an external network or media.

A

Data exfiltration

20
Q

The command that shows state of TCP / UDP ports on the local machine.

A

netstat