Random Questions to remember Flashcards

1
Q

COOP

A

Continuous Of Operations Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps in the cyber kill chain

A

Reconnaissance,

Weaponization,
Delivery,
Exploitation,
Installation,
Command and Control (C2), and

Actions on Objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary role of the DPO (Data protection Officer)?

A

The primary role of the data protection officer (DPO) is to ensure that her organization processes the personal data of its staff, customers, providers, or any other individuals (also referred to as data subjects) in compliance with the applicable data protection rules.

They must understand how any privacy information is used within business operations. Therefore, they are the best person for the auditor to interview to get a complete picture of the data usage.

An Auditor may talk to them in regards to understanding how the PII data from a particular database is used within a business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is SPI (Sensitive Personal Information)

A

Sensitive Personal Information (SPI). Sensitive personal information (SPI)

is information about a subject’s opinions, beliefs, and nature afforded specially protected status by privacy legislation. As it cannot be used to identify somebody or make any relevant assertions about health uniquely, it is neither PII nor PHI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Hashing algorithm results in a 160- bit fixed output?

A

RIPMED - 160 Bits
NTLM - 128
SHA-2 - 256
MD-5 - 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Methods available to sanitize a hard drive?

A

Sanitizing a hard drive can be done using Cryptographic erase (CE),
Secure Erase (SE),
Zero-fill, or
Physical destruction.

The cryptographic erase (CE) method sanitizes a self-encrypting drive by erasing the media encryption key and then reimaging the drive.

A secure erase (SE) is used to perform the sanitization of flash-based devices (such as SSDs or USB devices) when cryptographic erase is not available.

The zero-fill method relies on overwriting a storage device by setting all bits to the value of zero (0), but this is not effective on SSDs or hybrid drives, and it takes much longer than the CE method.

“Clear or format” - simple overwriting data once with zeros.

Physical destruction occurs by mechanical shredding, incineration, or degaussing magnetic hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

provide an example of a symmetric cryptographic algorithm

A

AES - Advanced Encryption Standard is a symmetric-key algorithm for encrypting established as an electronic data encryption standard by NIST in 2001. AES can use a 128-bit key and uses a 128- bit block size

RC4
AES
3DES
DES
Twofish

are all symmetric algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Technology could allow certain users to only use certain ports in the network, but allow other users full access in the same ports?

A

Network Access Control

Network Access Control (NAC) uses a set of protocols to define and implement a policy that describes how to secure access to network nodes whenever a device initially attempts to access the network. NAC can utilize an automatic remediation process by fixing non-compliant hosts before allowing network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provide an example of an asymmetric cryptographic algorithm

A

PGP - Pretty Good Privacy is an encryption program that provides cryptographic privacy and authentication for data communication.

PGP is used for signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions and to increase the security of email communications. PGP is a public-key cryptosystem and relies on an asymmetric algorithm.

GPG,
ECC,
DSA
Diffie helman

are all asymmetric algorithms.250410

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Analysis framework provides a graphical depiction of the attackers approach relative to a kill chain?

A

The Diamond Model provides an excellent methodology for communicating cyber events and allowing analysts to derive mitigation strategies implicitly.

The Diamond Model is constructed around a graphical representation of an attacker’s behavior. T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a FM-200

A

FM-200 is a fire extinguishing system commonly used in data center. When protecting a data center, think always fire first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What File Transfer Protocol negotiates a tunnel before the exchange of any commands?

A

FTPS - FTPES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Port does DNS Sec use

A

53 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What port or service is likely used in phone calls, email, banking, shopping

A

HTTPS 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What SSL/TLS version supports Secure Hashing Algorithm - SHA-256 Cipher

A

TLS 1.2, Thats the primary difference between TLS 1.1 and 1.2 - SSL 3.0 is less secure and it does not support SHA 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whats a protocol for management and monitoring that supports encryption and have a strong user based authentication

A

SNMPv3 - older versions send community names in plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

examples where TLS can provide encrypted communication and where it can’t

A

Can do: Directory services, File transfer, Web

Can’t - Time synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Names of mode in which the entire network packet is encrypted

A

Tunnel mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IPSec Mode in which only the payload is encrypted

A

Transport mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which EAP Wireless supports tLS and whic doesn’t

A

Do: Eap-ttls
Peap
Eap-tls

Leap doesn’t It’s Iightweight.

21
Q

What Does Nist RMF Stand for and what are the steps?

A

NIST is the National Institute of Standards and Technology. RMF is Risk Management Framework the steps are:

1.- Prepare
2.- Categorize System
3.- Select controls
4.- Implement controls
5.- Assess controls
6.- Authorize system
7.- Monitor Controls

22
Q

Name Types of Government data classification

A

Confidential
Secret
Top Secret

22
Q

Name Types of Government data classification

A

Confidential
Secret
Top Secret

23
Q

How do you calculate SLE?

A

Av * EF

Asset value * exposure factor

24
Q

What are the ste[s In IR Incident Response

A

Prepration, Identification, Containment, Eradication, Recovery, and lessons learned

25
Q

What is the diference between a playbook and a runbook

A

A Playbook lists the actions that an organization will take as part of a response process. Playbooks tend to be used to document process

A Runbook lists the steps required to perform an action like notification, removing malware, or similar tasks.
Runbooks tend to be used for specific actions

26
Q

Describe the various classes of fire extinguishers and their uses

A

Certainly! Here’s a list of fire extinguisher classes A, B, C, D, and K, along with their uses:

Class A Fire Extinguishers:

Use: Designed for fires involving ordinary combustible materials, such as wood, paper, cloth, and plastics.
Examples: Water extinguishers, foam extinguishers.
Class B Fire Extinguishers:

Use: Suitable for fires involving flammable liquids and gases.
Examples: Foam extinguishers, carbon dioxide (CO2) extinguishers, dry chemical extinguishers.
Class C Fire Extinguishers:

Use: Intended for fires caused by energized electrical equipment.
Examples: Carbon dioxide (CO2) extinguishers, dry chemical extinguishers.
Class D Fire Extinguishers:

Use: Designed for fires involving combustible metals, such as magnesium, titanium, potassium, and sodium.
Examples: Specialized dry powder extinguishers for specific metal fires.
Class K Fire Extinguishers:

Use: Specifically designed for fires in commercial kitchens involving cooking oils, fats, and grease.
Examples: Wet chemical extinguishers.

27
Q

What are CAM Tables and what are they for?

A

Tje Content-Adressable-Memory (CAM) Tables on switches contain a list of all the devices they have talked to and will give someone the best chance of identifying the devices on the network.

28
Q

What is Cuckoo dor the Sec+

A

Cuckoo is a malware analysis tool used to analyze suspicious files and detect malware. Here are key points to know:

Purpose: Cuckoo is designed to provide detailed information about the behavior of malware samples in a controlled environment.

Sandbox Environment: It creates a virtual sandbox environment to execute the malware safely and observe its activities without affecting the host system.

Dynamic Analysis: Cuckoo monitors and records the actions and interactions of the malware, including network traffic, system calls, registry modifications, and file changes.

Indicators of Compromise (IOCs): Cuckoo helps identify IOCs, such as malicious network connections, file modifications, and changes in system behavior, to assist in threat intelligence and incident response.

Reporting: Cuckoo generates comprehensive reports that include behavioral analysis, network traffic captures, and detected malicious activities.

Integration: Cuckoo can be integrated with other security tools, such as antivirus scanners, intrusion detection systems (IDS), and threat intelligence platforms.

Limitations: While Cuckoo is a powerful tool, it has limitations. It may not be able to analyze sophisticated or heavily obfuscated malware. Additionally, attackers may design malware to detect and evade sandbox environments.

29
Q

What is Exiftool?

A

ExifTool is a powerful command-line tool used for reading, writing, and manipulating metadata in various file formats, particularly image and multimedia files. Here are key points to know:

Purpose: ExifTool allows examination and modification of metadata, which includes information about the file itself, the device or software used to create it, and other details.

Supported File Formats: ExifTool supports a wide range of file formats, including image formats (JPEG, PNG, TIFF), audio formats (MP3, WAV), video formats (MP4, AVI), and document formats (PDF, DOCX).

Metadata Extraction: ExifTool can extract a broad range of metadata, such as camera make and model, date and time of creation, geolocation information, camera settings, software details, and more.

Metadata Modification: ExifTool allows modification of metadata, enabling users to update or remove specific metadata fields from files.

Batch Processing: ExifTool supports batch processing, allowing users to apply metadata operations to multiple files simultaneously, which is useful for automating repetitive tasks.

Integration: ExifTool can be integrated into scripts or used in conjunction with other tools for enhanced metadata manipulation and analysis.

Limitations: While ExifTool is a versatile tool for working with metadata, it does not analyze the content of files or provide deep forensic analysis. It focuses primarily on metadata extraction and manipulation.

Understanding ExifTool and its capabilities is important for handling metadata in various file formats, performing forensic investigations, and managing digital assets.

30
Q

What is Netcat? or NC?

A

Netcat, also known as “nc,” is a versatile networking utility used for reading from and writing to network connections. Here are key points to know:

Purpose: Netcat is primarily used for network troubleshooting, port scanning, transferring files, and establishing network connections.

Connection Modes: Netcat supports multiple connection modes, including client mode, server mode, and a combination of both (sometimes referred to as “listener” mode).

Port Scanning: Netcat can be used to perform basic port scanning by attempting to establish connections with target hosts on specific ports to determine their availability.

File Transfer: Netcat allows file transfer between systems using various protocols, such as TCP or UDP. It can be used to send and receive files over the network.

Remote Shell: Netcat can be used to establish a remote shell on a target system, enabling command execution and interaction with the remote machine.

Banner Grabbing: Netcat can retrieve banner information from network services, helping to identify the operating system, service version, or other details.

Reverse Shells: Netcat enables the creation of reverse shells, allowing remote access to a target machine by establishing a connection initiated from the target to the attacker’s system.

Limitations: While Netcat is a powerful tool, it lacks encryption and authentication mechanisms, making it insecure for transmitting sensitive data over untrusted networks.

31
Q

What benefit does symmetric encryption have over asymmetric encryption?

A

Symmetric Encryption is faster.
Key Distribution is more challenging with Symmetric Key - 1 to one needed.

32
Q

What is Entropy

A

Entropy is a measure of uncertainty. - It’s a key element in a Pseudo - Random Number Generators (PRNG) -
Some PRNG - relies on input from keyboards or mice to have a source of entropy data

33
Q

What are RFC’s and what are they for?

A

RFCs or “Request for comment” are how internet protocols are defined and documented.

34
Q

What is CER ?

A

Cross-over Error Rate - is where the False Acceptance Rate and the False Rejection Rate cross over.

35
Q

What are Stored Procedure?

A

Widely used in many database management systems to contain SQL The Database Administrator, creates the various SQL statements that are needed in that business, and then programmers can simply call the stored procedures.

36
Q

What is Protected Cable Distribution?

A

Protected Cable Distribution uses controls such as electrical, electromagnetic and even acoustic or air pressure sensors to ensure that cables and distribution infrastructure are not accessed, allowing sensitive information to be transmitted Unencryped form. The Us Government identifies three options: Hardened carrier, alarmed carrier, and continuously viewed protected distribution system.

37
Q

What type of Access controls does Windows and Linux use?

A

Discretionary Access Control

38
Q

Regarding ABAC Access controls which is an issue that is specific to ABAC that may cause it to incorrectly reject logins?

A

Geographic location

39
Q

Whats the best way to secure NTP (Network Time protocol)

A

SSH Tunneling

40
Q

What’s the difference between a stateful and stateless firewall

A

stateless firewall filters individual packets based on their attributes, while a stateful firewall maintains knowledge about active connections to make more informed decisions about allowing or blocking traffic.

Stateful firewalls are generally more advanced and capable of providing better network security compared to stateless firewalls.

41
Q

What was CHAP authentication protocol designed for?

A

to sop session hijacking
PReventsa replay attacks
It’s better than PAP
Not as good as EAP or EAP-TLS EAP-PEAP

42
Q

wHAT IS Tacacs+

A

ertainly! TACACS+ (Terminal Access Controller Access Control System Plus) is an authentication, authorization, and accounting (AAA) protocol used to control access to network devices. Here’s a concise overview of TACACS+ for your Security+ certification:

AAA Protocol: TACACS+ is an AAA protocol used to manage user access to network devices, such as routers, switches, and firewalls.

Separation of Functions: TACACS+ separates authentication, authorization, and accounting into distinct phases, allowing for more flexibility and security in network access control.

Encryption: TACACS+ encrypts the entire authentication process, ensuring that sensitive information like usernames and passwords remain secure during transmission.

Remote Authentication: TACACS+ allows centralized authentication, which means user credentials are verified by a TACACS+ server. This centralized approach streamlines management and security.

Authorization: After authentication, TACACS+ can also handle authorization, specifying the level of access and the commands a user is allowed to execute on the network device.

Accounting: TACACS+ provides accounting functionality, which allows the tracking and recording of user activities on network devices. This is crucial for audit trails and security analysis.

Vendor-Neutral: TACACS+ is vendor-neutral, meaning it can be used with devices from various manufacturers.

Enhanced Security: TACACS+ offers improved security compared to its predecessor, TACACS, by using encryption and providing more extensive control over access permissions.

TCP Port 49: TACACS+ typically uses TCP port 49 for communication between the client (network device) and the TACACS+ server.

Common Alternatives: While TACACS+ is prevalent in Cisco environments, RADIUS (Remote Authentication Dial-In User Service) is another popular AAA protocol widely used in many other networking scenarios.

Remember that TACACS+ is widely used for network device management, but its implementation and usage may vary across different organizations. Understanding its principles will help you grasp the fundamentals of network access control and security.

43
Q

Describe EAP-TLS (Transport Layer Security):

A

Provides strong security by using digital certificates to authenticate both the client and the server. Requires the deployment and management of certificates.

44
Q

Describe EAP-PEAP

A

Protected Extensible Authentication Protocol): Encapsulates EAP within a TLS tunnel, providing encryption for the authentication process. Simplifies certificate management, as only the authentication server requires a certificate.

45
Q

EAP-TTLS

A

(Tunneled Transport Layer Security): Also encapsulates EAP within a TLS tunnel but allows for a variety of authentication methods within the inner tunnel. Simplifies the migration from insecure legacy systems.

46
Q

EAP-MD5

A

(Message Digest 5): Simple EAP method that uses MD5 for hashing passwords. Not recommended for use due to its vulnerability to password cracking attacks.

47
Q

What is 801.1x ?

A

802.1X is an IEEE standard for network access control that provides port-based authentication. It allows the network to authenticate users or devices before granting access. Several EAP (Extensible Authentication Protocol) based protocols can be used with 802.1X. Here’s a concise overview of the EAP-based protocols for your Security+ certification:

EAP-TLS (Transport Layer Security): Provides strong security by using digital certificates to authenticate both the client and the server. Requires the deployment and management of certificates.

EAP-PEAP (Protected Extensible Authentication Protocol): Encapsulates EAP within a TLS tunnel, providing encryption for the authentication process. Simplifies certificate management, as only the authentication server requires a certificate.

EAP-TTLS (Tunneled Transport Layer Security): Also encapsulates EAP within a TLS tunnel but allows for a variety of authentication methods within the inner tunnel. Simplifies the migration from insecure legacy systems.

EAP-FAST (Flexible Authentication via Secure Tunneling): Combines elements of EAP-TLS and EAP-TTLS, providing a secure tunnel for credentials exchange. Designed for fast deployment and works well in low-resource environments.

EAP-MD5 (Message Digest 5): Simple EAP method that uses MD5 for hashing passwords. Not recommended for use due to its vulnerability to password cracking attacks.

EAP-SIM (Subscriber Identity Module): Primarily used in cellular networks, it enables devices to use the SIM card for authentication.

EAP-AKA (Authentication and Key Agreement): Similar to EAP-SIM but used in 3G and 4G cellular networks, providing mutual authentication between the device and the network.

EAP-GTC (Generic Token Card): Allows for a wide range of authentication methods, typically used in token-based systems.

When deploying 802.1X, the choice of EAP-based protocol will depend on the specific security requirements, ease of deployment, and compatibility with the network infrastructure and devices.

48
Q

Wawa

A