Test Out 2.0 Flashcards
(43 cards)
GRC stands for
governance, risk and compliance
SLO stands for
service level objective
COPPA stands for
children’s online Privacy Protection Act
CERT stands for
Computer emergency response team
CSIRT stands for
Computer security incident response team
IDP stands for
identity provider
nmap -sT
scans TPC
nmap -sU
sancs UPD
nmap -A
OS scanning
nmap –top-ports <num></num>
scans the number of top ports
nmap -T<0-5>
sacn speed 5 is the fastest
nmap -S<IP></IP>
spoofs the IP address
nmap -p<port></port>
scan port range
EDR Stands for
Endpoint Detection and Respones
What is Maltego?
Maltego is a visualization tool that gathers public information and presents it connected in a graph. It can research and map entities quicker than other tools.
What is Recon-ng?
Recon-ng uses the Metasploit framework but focuses primarily on web-based reconnaissance to reveal an organization’s subdomains, and software versions, to name a few. This may also involve taking longer to find large amounts of information.
What is Nikto?
is a web server scanner. It tests for outdated versions of more than 1,250 servers.
What is OWASP ZAP?
is an open-source web application security scanner designed specifically for testing web applications. It is both flexible and extensible
NIDS stands for
network intrusion detection system
What is a network tap?
Network taps are a rogue device type (not a method). A physical device might be attached to cabling to record packets passing over that segment. Once attached, taps cannot usually be detected from other devices inline with the network, so physical inspection of the cabled infrastructure is necessary.
Server-side request forgery (SSRF) is a security vulnerability
where an attacker tricks a web application into sending malicious HTTP requests to an internal or external network resource that trusts the web application. It could lead to data theft or system compromise.
Cross-site scripting (XSS) is a web application vulnerability
that allows attackers to inject malicious scripts into web pages viewed by other users, often leading to the theft of user data or control of their browser.
IoC stands for
Indicator of Compromise
Preloading is
influencing a target’s thoughts, opinions, and emotions before something happens.