2.4-3.1 Flashcards

1
Q

ddos reflection amplification

A

sending many requests to protocols that require no authentication to take up bandwidth through a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

dns poison

A

send fake response to valid dns request, “on-path attack”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

rf jamming

A

transmit interfering wireless signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

on path

A

redirects your traffic, arp poisonning is on path attack on the local IP subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how to prevent session hijacking

A

encrypt end to end using vpn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

privilege escalation

A

gain higher level access to a system using a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

birthday attack

A

uses collisions which are same hash output for different plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

downgrade attack

A

force systems to downgrade their security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IOC

A

indicators of compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

acl

A

access control list
allow or disallow traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

app allow/deny

A

allow=strict only apps on allow can run
deny= anything except apps on deny can run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

monitoring methods

A

info from devices

sensors- fw logs, ips, authentication logs

collectors- siem consoles, syslog servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

configuration enforcement

A

checking posture of devices, and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

decommisioning

A

getting rid of a device. should have a formal policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

responsibility matrix

A

shows who is responsible for what depending on the service they provide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

hybrid cloud considerations

A

mix public and private cloud which can have network protection mismatches, data leakage

17
Q

FaaS

A

Function as a Service
doesn’t need os. applications are individual autonomous. event triggered and ephemeral

managed by third party security is done by third party

18
Q

api architecture

A

also known as monolithich architechtrure is one big programmable app does it all

19
Q

microservice architecture

A

scalable, resilient

20
Q

sdn

A

software defined networking. data, control, mgmt. splits functions into separate logical units.

21
Q

data plane

A

process the network frames and packets

22
Q

control plane

A

manages the actions of the data plane

23
Q

mgmt plane

A

api, configure and manage the device

24
Q

centralized infrastructure

A

everything in one place. single point of failure

25
Q

centralized vs decentrilized

A

when organization have all systems in different places they are decentralized. so they have to consolidate and make it centralized (single point of failure)

26
Q

app containerization

A

DOCKER is containerization software, manage multiple apps. apps cant interact with each other

27
Q

rtos

A

real time operating system. drive car when u brake hard all system of car focuses on brakes

28
Q

embedded systems

A

hardware and software designed for a specific function.

traffic light, medical image system

29
Q

resilience

A

also known as mttr