Teacher Highlights Flashcards

(70 cards)

1
Q

The model Microsoft uses for threat analysis and identification is called ___.

A

STRIDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does STRIDE stand for?

A
  • Spoofing
  • Tampering
  • Repudiation
  • Information disclosure
  • Denial of Service
  • Elevation of privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is spoofing?

A

Pretending to be something or someone other than yourself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is tampering?

A

Modifying something on a disk, network, memory, or elsewhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is repudiation?

A

Claiming you didn’t do something or were not responsible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is information disclosure?

A

Providing information to someone not authorized to have it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is denial of service?

A

Exhausting resources needed to provide services to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is elevation of privilege?

A

Allowing someone to do something they are not authorized to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ is an aggregation of compromised computers, turning them into robots used by attackers.

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of network attacks?

A

Denial of Service, Distributed Denial of Service, Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The following describes which network attack?

__ __ __ attacks are probably the nastiest, and most difficult to address. They are very easy to launch and often difficult (sometimes impossible) to track because of their timing. The intent is to send
more requests to a machine than it can handle, disrupting or even totally blocking user services.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

While a standard DoS attack comes from one computer, a __ __ __ __ attack, involves multiple computers sending requests, and is usually performed by a botnet.

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When it comes to Executing Commands Illicitly, there are two main classifications of users and their system access capability:

A

user access and administrator access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When it comes to Destructive Behavior, there are two major categories of break-ins and attacks:

A

Data Diddling and Data Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ ___ occurs when an attacker makes small changes or entries in records to change the original meaning. It is a form of computer fraud involving the intentional falsification of numbers in data entry.

A

Data Diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The term ___ ___ can be defined as the process of destroying the data stored on tapes, hard disks, and other forms of electronic media so that it is completely unreadable.

A

Data Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ is a non-technical or low-technology confidence trick (“con”) used for attacking information systems, often involving trickery or fraud.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two different types of phishing?

A

Spear Phishing and Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ ___ is a type of phishing that targets a specific group of individuals by sending messages that appeal to the group. Phishers may identify their targets by name using information collected from public sources such as social media.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

___ is a specific form of spear phishing targeted at high-value individuals, such as a CEO or company board member. This type of target provides an especially high payoff for potential attackers
due to the type and amount of information they have access to.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

___ techniques attempt to acquire sensitive data, such as bank account numbers, passwords, email accounts, etc., through fraudulent solicitation via email, text messages, or websites. A perpetrator masquerades as a legitimate business or reputable person, often broadcasting messages to a wide audience of targets or individuals within an organization or otherwise. Imagine a fisherman casting a line into the water with a baited hook waiting for a victim to bite.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___ tricks a victim by using their curiosity or greed against them. It encourages any user who happens to come across the bait to perform some action to trigger a trap, such as installing malware onto a device.

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Software is considered ___ because of the perceived intent of the creator rather than any features of the software itself.

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A ___ ___ is a type of virus planted on the system by installing a piece of software that contains some code that will not execute until a certain event occurs, such as a specific date.

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
___ is a type of malware that prevents or limits users from accessing their system. Attackers can encrypt a victim’s entire system, specific files, or they may lock the system’s screen until the victim pays a specified ransom to have their data unencrypted or unlocked by the attacker.
Ransomware
26
___ software is your system’s protection against viruses. Your system can contract viruses from websites, e-mail attachments, etc. ___ programs inspect the contents of each file. They search for a virus signature, that is, specific patterns that match a malicious profile of something known to be harmful. For each file that matches a signature, the ___ program provides options on how to respond, such as removing the offending patterns, quarantining the file, or deleting the file.
Anti-virus
27
When it comes to countermeasures, what are the steps of the response phase of an attack?
Tasks such as defining the attack, informing users of the attack, contain the intrusion, identifying the source, notifying all interested parties (to include legal authorities), and compiling detailed repair reports for the entire affected system
28
___ ___ ___ refers to efforts to enhance the security of the supply chain, the transport and logistics system for the cargo. It combines traditional practices of supply-chain management with the security requirements driven by threats such as terrorism, piracy, and theft.
Supply chain security
29
Typical supply-chain security activities include:
* Credentialing of participants in the supply chain. * Screening and validating of the contents of cargo being shipped. * Advance notification of the contents to the destination. * Ensuring the security of cargo while in-transit via the use of locks and tamper-proof seals. * Inspecting cargo on entry.
30
Cloud computing is a powerful business solution because it allows an organization to save on hardware and management costs while maintaining high availability. However, cloud computing often relies on a third party to handle your data, which could include sensitive information. Ensuring the third party is securing this data is an important prerequisite when considering moving in-house services off-site and putting them into the hands of a third party.
Third Party Data Storage
31
A third party in a supply chain is an intermediary, subcontracted individual, or company that provides a product or a service in support of the primary objectives of an organization. Support services can vary widely from janitorial services to software engineering, and more. Granting either ___ or ___ access to an organization’s information system, software code, or intellectual property can leave these assets vulnerable to exploitation through malicious actions or carelessness
physical or virtual
32
___ ___ ___ is a wired and wireless network security solution that allows control of access based on predefined conditions that systems must meet prior to being granted access to a network. Any system not meeting the conditions may be directed to a restricted network that allows the user to become compliant and then gain access to the main network. The restricted network does not grant access to network resources.
Network Access Control (NAC)
33
___ NAC utilizes software installed on clients which authenticates the client to the NAC for scanning before allowing network access. ___ NAC does not require agent software to be installed on a client. The authentication server will perform any required checks.
Agent-based Agentless
34
NAC agents can be ___, thereby continuously monitoring the system it’s installed on, or they can be ___. ___ agents are installed on the device when it attempts to connect to the network. After scanning the device for compliance, the ___ NAC will either remove itself immediately, or it may remain on the device until the device disconnects from the network
permanent dissolvable
35
However, the drawback to this authenticator is that if an account is compromised, a hacker can now access multiple servers rather than just one.
Single Sign On (SSO)
36
Which authentication method is the following referring to? With ____, clients can access a network remotely by connecting to a ____ client which sends an authentication request via User Datagram Protocol (UDP) to a ____ server which either verifies or rejects the credentials, thereby granting or denying access. The 802.1X protocol can be used in conjunction with ____ on wireless networks and switches that support it.
RADIUS
37
Which authentication method is the following referring to? ___ is a newer AAA protocol that gives a more reliable and secure communication service through Transmission Control Protocol (TCP).
Diameter
38
What are the six SDLC phases?
1. Requirements Gathering and Analysis 2. Design 3. Implementation 4. Testing 5. Deployment 6. Maintenance
39
The code must be checked for functionality, that the application does what it’s designed to do. Developers should also input random invalid data into input fields to check for crashes, memory leaks, and other bugs. This process is known as fuzzing.
SDLC Phase "Testing"
40
Best practices dictate that software developers provide ___ ___, ensuring that when data is entered into an application and buttons are pressed, the desired result happens. Ensure that no possible keyboard characters leave room for manipulation by hackers.
input validation
41
Web sites and applications using ___ ____ can manipulate a system, obtaining full system access and potentially exploiting security vulnerabilities. On a Microsoft Internet browser, a user might be prompted to agree to run ___ ___. This practice should be discouraged.
ActiveX controls
42
____ data puts the information in an unreadable format until an authorized person decrypts the data, which places it back to cleartext ( a readable format).
File Encryption
43
___ ___ ___ detects suspicious activity on a host or a network, logs it, and alerts system or network administrators.
Intrusion Detection System (IDS)
44
___ ___ ___ monitor hosts or networks for suspicious activity and take corrective action.
Intrusion Prevention Systems (IPS)
45
IDSs and IPSs can be either ____ (HIDS/HIPS) or ____ (NIDS/NIPS).
host-based network-based
46
___ ___ has the system digitally sign bootup files. Only digitally signed bootup files will run. This process prevents someone from booting up a different operating system to gain access.
Secure boot
47
___ ___, or hardware encryption, applies very complex encryption more quickly than software encryption. Hardware encryption is done using chips physically installed in the system.
Device encryption
48
When using Full Disk Encryption (FDE), a ____ stores cryptographic keys used to encrypt the data. On Windows-based OS’s, BitLocker utilizes TPM.
Trusted Platform Module (TPM)
49
___ ___ ___ (HSM) Cryptographic processors can also be stored on a separate card that can be installed on a system. The HSM is an add-on device.
Hardware Security Module (HSM)
50
The ___ ___ is responsible for receiving packets from the sensor or collector and then performing the analysis on the packets to determine if they are suspicious.
analysis engine
51
The following describes which backup type? This backup type backs up all files and folders. It does not rely on the archive bit to tell it what to backup, but it does clear the bit as each file is backed up. Restoring a ___ backup recovers all data that may have been lost.
Full Backup
52
The following describes which backup type? ___ backups back up everything that has changed since the most recent full backup. ____ backups do not clear the archive bit.
Differential Backup
53
____ backups backup all data that has changed since the previous backup. ___ backups do clear the archive bit.
Incremental Backup
54
What are the three configuration management benefits?
1. Benefit 1: Disaster Recovery 2. Benefit 2: Uptime and Site Reliability 3. Benefit 3: Scalability
55
The baseline configuration is the ___ ___ for all future baseline assessments.
starting point
56
When it comes to backup methods, it is a good business practice to store data where?
offsite
57
During a cyber incident process, how long do you have to determine if the event or incident AF Operational Reporting (OPREP-3) and/or USSTRATCOM or USCYBERCOM Commander's Critical Information Requirements (CCIR) reporting requirements?
within 1 hour
58
The first thing to do to prepare for handling security incidents within your organization is to make sure that you have an incident response team in place (also known as a computer incident response team (CIRT). The first step is to..?
Create the team
59
Who are the four members typically found on a response team?
1. Team Leader 2. Technical Specialist 3. Documentation Specialist 4. Legal Advisor
60
The ____ zone is designed for visitors to your office location. Visitors typically do not need access to the private network or even the extranet zone; they typically just need Internet access to check email and surf the Internet.
Guest zone
61
What are the three primary security zones?
1. Private Zone - The Local Area Network resides in the private zone. 2. Demilitarized Zone - The DMZ is an area between two firewalls 3. Public Zone - The public zone is any network not controlled by the network administrator.
62
There are two major classes of firewalls:
software-based and hardware-based
63
NIDS is configured on the what?
Console
64
Web sites store ___ (small text files) client computers that contain user preferences and logon information on. If the text file is accessed by someone else, they can see the information on it.
Cookies
65
Files such as music, videos and software can be shared online between users using ____ applications, such as BitTorrent. This is a common method of transmitting malicious code.
Peer-to-peer (P2P) file sharing
66
___ are used to automate processes on a computer and for generating web pages. This creates an application security issue because ___ can make modifications to a system without user input.
Scripting
67
Systems that provide centralization of authentication, authorization, and accounting are known as..?
Triple A (AAA)
68
A RADIUS client sends an authentication request via..?
UDP
69
Diameter is a newer AAA protocol that gives a more reliable and secure communication service through...?
TCP
70
During which SDLC phase does the following apply to? The code must be checked for functionality, that the application does what it’s designed to do. Developers should also input random invalid data into input fields to check for crashes, memory leaks, and other bugs. This process is known as fuzzing.
Testing