Sec + 2 Flashcards

(35 cards)

1
Q

Secure enclave

A

Hardware security features in modern processors that provide a separate and isolated environment for secure operations like storing sensitive data and executing cryptographic operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a crl?

A

Certificate revocation lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a ocsp?

A

Online certificate status protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an apt?

A

Advanced persisted threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is operational capacity?

A

Money and resources of attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a ssid?

A

Service set identifier, network name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a pan?

A

Personal area network, Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to fight memory injection of apps?

A

Code signing, input validation, memory protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to prevent buffer overflow?

A

Input validation, proper memory management, programming languages with built-in safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are race conditions?

A

When two instructions from separate threads try to access data at same time, theoretically the 1st person can manipulate the data of 2nd person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some hardware vulnerabilities?

A

Outdated firmware, inadequate security programming, bad encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a vm escape?

A

Moving from vm to a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is risk of shared tenancy and where is it relevant?

A

Share resources in the cloud where leaks from one user can effect the whole.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a ssl/test downgrade?

A

Ssl traffic is intercepted and tricked into thinking it is going to a older/ less secure browser so it switches to a weaker encryption method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is jailbreaking?

A

On apple devices. Unlocking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is rooting?

A

Android jailbreaking.

17
Q

What is side loading?

A

Downloading unsupported apps.

18
Q

How does Spyware work?

A

With cookies.

19
Q

What is rfid?

A

Radio frequency id cloning. Copying signals from key cards or badges.

20
Q

How to do a syn flood attack?

A

Flood computer with syn requests that are never answered

21
Q

What is an amplified attack? What is an example?

A

Sending small requests that trigger a big response.

Smurf attack-arracker sends a large number of icmp requests to an intermediate device, like a router, 4 each request, there are 4 replies. Made to look like they came from a victims ip address clogging it up.

22
Q

What is icmp?

A

Internet control message protocol. A ping

23
Q

What is arp? Where in osi does it work?

A

Address resolution protocol. Maps ip addresses to mac addresses.

Layer 2

25
What is dns cache poisoning?
Manipulating dns to redirect to malicious sites
26
How to view dns cache?
Ip config/displaydns
27
How to clean dns cache?
Ip config/flushdns
28
How to check dns record in dns server?
Dnslookup computer 1
29
What is an evil twin?
Sophisticated rogue access point. Can capture packets
30
What is ssl stripping?
Intercepting and https and downgrading it to a http.
31
Indications of attack
1. Account lockout 2. Concurrent session usage 3. Blocked content 4. Impossible travel 5. Resource consumption 6. Resource in accessibility 7. Out of cycle logging 8. Missing logs
32
What is micro segmemtation?
Policy's for single endpoints. Crucial in cloud environments and data centers
33
What is soar?
Security orchestration, automation, and response. Uses ai and playback. Good for mundane tasks.
34
What is edr?
Endpoints detection and response. Uses ai.
35
What are ioc's?
Indicators of compromise