Linkedin Notes Flashcards
(35 cards)
What are the 7 stages of cyber Kill chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and control
Actions
What are the four tenants of zero trust?
1) Just in time access (jita)
2) Just enough access (jea)
3) Tokenisation or encryption
4) Adaptive policies
At which country was Stuxnet targeted?
Iran. USA wanted to hinder their nuclear programme
An exploit is called zero day until what occurs?
A patch is realised
What is a PUP?
Potentially Unwanted Program
What is the software that is used to store a payload onto a target computer?
dropper
What is the main assumption in a zero trust approach?
The network perimeter has been breached.
Mark Abene was, at different times, in both LOD and MOD. What was his internet nickname?
Phiber Optik
Tasks can be run using mpcmdrun at the command line.
True
Which variant of Linux had a keylogger maliciously installed?
Mint
Does Windows Defender offers cloud protection.
True
What is the EICAR string used for?
testing anti-virus software
What are the three Windows Firewall network types?
domain, private, public
Windows Firewall can mandate secure connections. What protocol does it enforce?
IPSec
NATing is used to filter malware.
False
Zedlan can read normal windows logs.
True
Which iptables parameter do you use to instruct the firewall to block packets?
Drop
What is the normal last command on a set of firewall rules?
Drop all packets
What switch setting can you use to do both TCP and UDP scans?
sSU
What switch setting do you use to do a network scan for active hosts?
sn
Running netcat with only the IP address and port will put it into which mode?
Sender
Which switch can you configure on a sender to set a timeout when doing a file transfer?
w
Session connection can be automated.
True