Sec + 9 Flashcards

(33 cards)

1
Q

What is a memorandum of agreement (MOA)?

A

Legally binding contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the rules of engagement?

A

Guidelines or agreements between clients and vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rules of engagement considerations

A
  1. Clarity and alignment
  2. Conflict prevention
  3. Efficiency
  4. Risk mitigation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Elements in internal compliance.

A
  1. Policy adherence
  2. Regular auditing
  3. Incident response evaluation
  4. Risk assessment
  5. Employee training.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Elements of external compliance.

A
  1. Regulatory adherence
  2. Third party audits
  3. Data privacy and protection
  4. Transparency and accountability
  5. Client and partner assurance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Consequences of non compliance

A
  1. Lower and upper tier fines
  2. Sanctions
  3. Reputation damage
  4. Loss of license
  5. Contractual impacts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Effective security awareness training should cover what?

A
  1. Policy/handbook
  2. Situational awareness
  3. Insider threats
  4. Password management
  5. Removable media and cables
  6. Social engineering.
  7. Operational security
  8. Hybrid/remote work environments.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security awareness practices framework.

A

Goals/needs
Develop
Delivery
Feedback
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is gamification?

A

Gamify training with elements like quizzes, challenges, and leaderboards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1 difference between a rogue acces point and an evil twin?

A

Rogue access point won’t use a similar ssid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is dynamic code analysis?

A

Analyzing code during runtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is regression testing?

A

Assuring that recent code changes don’t induce new defects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a wi-fi analyzer do.

A

Monitors wireless traffic and connectivity in a network. Can’t identify strong or weak signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Primary definition of enumeration in cyber.

A

Process of identifying and listing network resources and sources, such as user accounts, shares, and other info that can be used by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Problem with degaussing?

A

Unusable in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What scan is used to find missing patches from 3rd party vendors?

A

Credentialed scan

17
Q

What does MITRE ATT&CK used for?

A

Tracking and documenting an adversarys ttp’s.

18
Q

Most important step before adding a new system to current system?

A

Vulnerability scan

19
Q

What is SNMP?

A

Simple network management protocol

Used to monitor network devices in real time and provide status reports. Gets data from routers and switches

20
Q

What is DMARC?

A

Domain based message authentication reporting and conformance

Verifies email source and integrity.

Let’s you decide what to do with the email and also creates reports

21
Q

How to prevent phishing attacks using a dns record?

A

Create a sender policy framework record in the dns listing (only specify authorized email servers) requires a TXT RECORD.

22
Q

Instead of using port 80, which port should be used?

23
Q

Port 21 is bad, which port to use?

A

FTP, use port 22 as FTPS

24
Q

Port 25 is bad, which port to use instead?

A

SMTP use 587, SmTPS

25
Port 23 is bad, what to use instead?
22, 23 is telnet
26
Port 143 is bad, what to use instead?
Imap, use 993, secure Imap. Internet message access protocol
27
How to initiate FIM on windows and what will it do?
File integrity monitoring sfc /scannow Scans for and repairs corrupted or missing system files
28
What is SELLinux?
Security enhanced Linux Provides mandatory access controls and fine-grained permissions.
29
What is a hard authentication token?
Physical devices, such as hardware tokens or smart cards which generate the keys or tokens. Highly resistant to online attacks.
30
What are SSH keys used for?
Passwordless method to access remote Linux systems.
31
How many factors are used with smart card?
3 Something you have Something you know Something you do-entering the card
32
What does minimum password age prevent against?
Using recycled passwords too frequently
33
What gives temporary access rights?
JIT permissions.