Sec + 9 Flashcards
(33 cards)
What is a memorandum of agreement (MOA)?
Legally binding contract
What are the rules of engagement?
Guidelines or agreements between clients and vendors
Rules of engagement considerations
- Clarity and alignment
- Conflict prevention
- Efficiency
- Risk mitigation
Elements in internal compliance.
- Policy adherence
- Regular auditing
- Incident response evaluation
- Risk assessment
- Employee training.
Elements of external compliance.
- Regulatory adherence
- Third party audits
- Data privacy and protection
- Transparency and accountability
- Client and partner assurance.
Consequences of non compliance
- Lower and upper tier fines
- Sanctions
- Reputation damage
- Loss of license
- Contractual impacts
Effective security awareness training should cover what?
- Policy/handbook
- Situational awareness
- Insider threats
- Password management
- Removable media and cables
- Social engineering.
- Operational security
- Hybrid/remote work environments.
Security awareness practices framework.
Goals/needs
Develop
Delivery
Feedback
Monitor
What is gamification?
Gamify training with elements like quizzes, challenges, and leaderboards.
1 difference between a rogue acces point and an evil twin?
Rogue access point won’t use a similar ssid.
What is dynamic code analysis?
Analyzing code during runtime
What is regression testing?
Assuring that recent code changes don’t induce new defects.
What does a wi-fi analyzer do.
Monitors wireless traffic and connectivity in a network. Can’t identify strong or weak signals.
Primary definition of enumeration in cyber.
Process of identifying and listing network resources and sources, such as user accounts, shares, and other info that can be used by an attacker.
Problem with degaussing?
Unusable in the future
What scan is used to find missing patches from 3rd party vendors?
Credentialed scan
What does MITRE ATT&CK used for?
Tracking and documenting an adversarys ttp’s.
Most important step before adding a new system to current system?
Vulnerability scan
What is SNMP?
Simple network management protocol
Used to monitor network devices in real time and provide status reports. Gets data from routers and switches
What is DMARC?
Domain based message authentication reporting and conformance
Verifies email source and integrity.
Let’s you decide what to do with the email and also creates reports
How to prevent phishing attacks using a dns record?
Create a sender policy framework record in the dns listing (only specify authorized email servers) requires a TXT RECORD.
Instead of using port 80, which port should be used?
443, HTTPS
Port 21 is bad, which port to use?
FTP, use port 22 as FTPS
Port 25 is bad, which port to use instead?
SMTP use 587, SmTPS