Section 2 Flashcards

1
Q

What is an asset

A

A person, device, location, or information that SecOps aims to protect from attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a risk

A

The potential of a threat to exploit a vulnerability via an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SecOps

A

The abbreviation for IT security operations; a discipline within IT responsible for protecting assets by reducing the risk of attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat

A

Something or someone that can exploit a vulnerability to attack an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability

A

A weakness in software, hardware, facilities, or humans that can be exploited by a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an APT

A

a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a red team

A

attempts to compromise the security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a blue team

A

defends against the red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a purple team

A

while the red and blue team engage and certain success criteria are met, the teams debrief and cross-train each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens during a Smurf attack

A

DDoS attack where the attacker sends a forged ICMP echo-request packet to the broadcast address of a large IP subnet, which means that a massive number of computers would all receive the message. Instead of randomizing the source address as in the ping flood attack, in the Smurf attack, the attacker specifies the victim’s address as the source address. As each of the hundreds or thousands of computers receives the ICMP echo-request packet, each will respond by sending an ICMP echo-reply packet to the victim’s address, thereby crippling its network connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly