ops Flashcards
(298 cards)
Which two pieces of information are collected from the IPv4 protocol header? (Choose two.)
C. source IP address of the packet
D. destination IP address of the packet
In a SOC environment, what is a vulnerability management metric?
internet exposed devices
Which category relates to improper use or disclosure of PII data?
regulated
Which regex matches only on all lowercase letters?
[a-z]+
Which list identifies the information that the client sends to the server in the negotiation phase of
the TLS handshake?
ClientHello, TLS versions it supports, cipher-suites it supports, and suggested compression methods
An offline audit log contains the source IP address of a session suspected to have exploited a
vulnerability resulting in system compromise.
Which kind of evidence is this IP address?
corroborative evidence
Which security technology allows only a set of pre-approved applications to run on a system?
application-level whitelisting
Refer to the exhibit. Which type of log is displayed?
*** has a signature ID
IDS
There is a signature ID, then most definitely the event is a traditional IPS or IDS event.
Refer to the exhibit. Which two elements in the table are parts of the 5-tuple? (Choose two.)
Source Port
Initiator IP
A 5-tuple refers to a set of five different values that comprise a Transmission Control Protocol/Internet Protocol (TCP/IP) connection. It includes a source IP address/port number, destination IP address/port number and the protocol in use.
Which security principle is violated by running all processes as root or administrator?
principle of least privilege
What is the function of a command and control server?
It sends instruction to a compromised system
What is the difference between deep packet inspection and stateful inspection?
Deep packet inspection allows visibility on Layer 7 and stateful inspection allows visibility on Layer 4
Which evasion technique is a function of ransomware?
encryption
What does cyber attribution identity in an investigation?
threat actors of an attack
Drag and drop the security concept on the left onto the example of that concept on the right.
Threat
Network is compromised
Drag and drop the security concept on the left onto the example of that concept on the right.
Vulnerability
Lack of an access list
Drag and drop the security concept on the left onto the example of that concept on the right.
Risk Assessment
Configuration Review
Drag and drop the security concept on the left onto the example of that concept on the right.
Exploit
Leakage of confidential information
Drag and drop the access control models from the left onto the correct descriptions on the right.
DAC
Object owner determines permissions
Drag and drop the access control models from the left onto the correct descriptions on the right.
MAC
OS determines permissions
Drag and drop the access control models from the left onto the correct descriptions on the right.
RBAC
Role of the subject determines permissions
Drag and drop the access control models from the left onto the correct descriptions on the right.
ABAC
Attributes of the subject determines permissions
Drag and drop the technology on the left onto the data type the technology provides on the right.
Netflow
session data
Drag and drop the technology on the left onto the data type the technology provides on the right.
tcpdump
full packet capture