2.4-3.1 Flashcards

1
Q

ddos reflection amplification

A

sending many requests to protocols that require no authentication to take up bandwidth through a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

dns poison

A

send fake response to valid dns request, “on-path attack”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

rf jamming

A

transmit interfering wireless signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

on path

A

redirects your traffic, arp poisonning is on path attack on the local IP subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how to prevent session hijacking

A

encrypt end to end using vpn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

privilege escalation

A

gain higher level access to a system using a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

birthday attack

A

uses collisions which are same hash output for different plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

downgrade attack

A

force systems to downgrade their security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IOC

A

indicators of compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

acl

A

access control list
allow or disallow traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

app allow/deny

A

allow=strict only apps on allow can run
deny= anything except apps on deny can run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

monitoring methods

A

info from devices

sensors- fw logs, ips, authentication logs

collectors- siem consoles, syslog servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

configuration enforcement

A

checking posture of devices, and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

decommisioning

A

getting rid of a device. should have a formal policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

responsibility matrix

A

shows who is responsible for what depending on the service they provide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

hybrid cloud considerations

A

mix public and private cloud which can have network protection mismatches, data leakage

17
Q

FaaS

A

Function as a Service
doesn’t need os. applications are individual autonomous. event triggered and ephemeral

managed by third party security is done by third party

18
Q

api architecture

A

also known as monolithich architechtrure is one big programmable app does it all

19
Q

microservice architecture

A

scalable, resilient

20
Q

sdn

A

software defined networking. data, control, mgmt. splits functions into separate logical units.

21
Q

data plane

A

process the network frames and packets

22
Q

control plane

A

manages the actions of the data plane

23
Q

mgmt plane

A

api, configure and manage the device

24
Q

centralized infrastructure

A

everything in one place. single point of failure

25
centralized vs decentrilized
when organization have all systems in different places they are decentralized. so they have to consolidate and make it centralized (single point of failure)
26
app containerization
DOCKER is containerization software, manage multiple apps. apps cant interact with each other
27
rtos
real time operating system. drive car when u brake hard all system of car focuses on brakes
28
embedded systems
hardware and software designed for a specific function. traffic light, medical image system
29
resilience
also known as mttr