Test Out 2.0 Flashcards

(43 cards)

1
Q

GRC stands for

A

governance, risk and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SLO stands for

A

service level objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COPPA stands for

A

children’s online Privacy Protection Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CERT stands for

A

Computer emergency response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSIRT stands for

A

Computer security incident response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDP stands for

A

identity provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

nmap -sT

A

scans TPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

nmap -sU

A

sancs UPD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

nmap -A

A

OS scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

nmap –top-ports <num></num>

A

scans the number of top ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

nmap -T<0-5>

A

sacn speed 5 is the fastest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

nmap -S<IP></IP>

A

spoofs the IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

nmap -p<port></port>

A

scan port range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EDR Stands for

A

Endpoint Detection and Respones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Maltego?

A

Maltego is a visualization tool that gathers public information and presents it connected in a graph. It can research and map entities quicker than other tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Recon-ng?

A

Recon-ng uses the Metasploit framework but focuses primarily on web-based reconnaissance to reveal an organization’s subdomains, and software versions, to name a few. This may also involve taking longer to find large amounts of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Nikto?

A

is a web server scanner. It tests for outdated versions of more than 1,250 servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is OWASP ZAP?

A

is an open-source web application security scanner designed specifically for testing web applications. It is both flexible and extensible

19
Q

NIDS stands for

A

network intrusion detection system

20
Q

What is a network tap?

A

Network taps are a rogue device type (not a method). A physical device might be attached to cabling to record packets passing over that segment. Once attached, taps cannot usually be detected from other devices inline with the network, so physical inspection of the cabled infrastructure is necessary.

21
Q

Server-side request forgery (SSRF) is a security vulnerability

A

where an attacker tricks a web application into sending malicious HTTP requests to an internal or external network resource that trusts the web application. It could lead to data theft or system compromise.

22
Q

Cross-site scripting (XSS) is a web application vulnerability

A

that allows attackers to inject malicious scripts into web pages viewed by other users, often leading to the theft of user data or control of their browser.

23
Q

IoC stands for

A

Indicator of Compromise

24
Q

Preloading is

A

influencing a target’s thoughts, opinions, and emotions before something happens.

25
MDA stands for
mail delivery agent
26
MTA stands for
message transfer agent
27
A fraggle attack is a DoS attack that targets
UDP protocol weaknesses.
28
A smurf attack is a DoS attack that targets
ICMP protocol weaknesses.
29
A teardrop attack prevents
TCP/IP packets from being reassembled.
30
the mail user agent (MUA) creates
an initial header and forwards the message to a mail delivery agent (MDA).
31
CSIRT stands for
computer security incident response
32
CERT stands for
computer emergency response team
33
Metasploit is on port
4444
34
SAML is a based on
XML
35
CWE stands for
(Common Weakness Enumeration) is a community-developed list of common software security weaknesses.
36
CVSS stand for
(Common Vulnerability Scoring System) is a scoring system that creates a way to organize and prioritize vulnerabilities that you look for and discover in your work as an ethical hacker.
37
NVD stand for
(National Vulnerability Database) was created in 2000. You can find it at nvd.nist.gov. The NVD list includes more specific information for each entry than the CVE list, such as fix information, severity scores, and impact rating. It is searchable by product name or version number, vendor, operating system, impact, severity, and related exploit range.
38
SOA stands for
Service-Oriented Architecture (SOA) does well is make maintenance easier, which also brings down production costs. It's much simpler to look over small batches of code than having to review huge chunks of it.
39
What do you need to carry out a DNS hijacking attack?
DNS records
40
What does SCAP stand for?
Security content automation Protocol
41
What is REST?
is an architectural style that provides simple communication standards on the internet between computer platforms. Systems that use REST are often known as RESTful systems.
42
What is UEBA
user and entity behavior analysis, which is the practice of gathering insight about network events based on users' daily behaviors. The data is used to create a baseline of behaviors that can help security teams recognize any anomalies.
43
What is ETDR
Endpoint Threat Detection and Response, which is a tool that monitors endpoints and network events.