Linkedin Notes Flashcards

(35 cards)

1
Q

What are the 7 stages of cyber Kill chain

A

Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and control
Actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four tenants of zero trust?

A

1) Just in time access (jita)
2) Just enough access (jea)
3) Tokenisation or encryption
4) Adaptive policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

At which country was Stuxnet targeted?

A

Iran. USA wanted to hinder their nuclear programme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An exploit is called zero day until what occurs?

A

A patch is realised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a PUP?

A

Potentially Unwanted Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the software that is used to store a payload onto a target computer?

A

dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main assumption in a zero trust approach?

A

The network perimeter has been breached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mark Abene was, at different times, in both LOD and MOD. What was his internet nickname?

A

Phiber Optik

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tasks can be run using mpcmdrun at the command line.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which variant of Linux had a keylogger maliciously installed?

A

Mint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does Windows Defender offers cloud protection.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the EICAR string used for?

A

testing anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three Windows Firewall network types?

A

domain, private, public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Windows Firewall can mandate secure connections. What protocol does it enforce?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NATing is used to filter malware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zedlan can read normal windows logs.

17
Q

Which iptables parameter do you use to instruct the firewall to block packets?

19
Q

What is the normal last command on a set of firewall rules?

A

Drop all packets

20
Q

What switch setting can you use to do both TCP and UDP scans?

21
Q

What switch setting do you use to do a network scan for active hosts?

22
Q

Running netcat with only the IP address and port will put it into which mode?

23
Q

Which switch can you configure on a sender to set a timeout when doing a file transfer?

24
Q

Session connection can be automated.

25
Netcat can detect the IP address of an incoming connection.
True
26
Nessus can only scan a single system in a scan run.
False
27
A web scanner cannot be used to proxy web traffic.
False
28
Who or what is the victim of a cross-site scripting attack?
a visitor to the target website
29
Scans can be run with or without credentials.
True
30
Which company produces the annual Top Ten Web Threats?
OWASP The Open Worldwide Application Security Project
31
What logic clause can be injected to achieve an SQL injection attack?
True, 1=1, 0=0
32
UDP traffic requires a three-way handshake.
False
33
What kind of traffic does Wireshark capture?
UDP, TCP, Web
34
HTTP traffic packets are obfuscated.
False
35