4.0 Flashcards
Volatile
Temporary memory or data that is lost when power is turned off or the system is restarted.
COOP
Continuity of Operations Planning
Process ensuring essential functions continue during and after disasters
Stakeholder Management
Engaging with individuals/groups that have an interest in a process or the outcome of a process.
Communication Plan
Provides direction on how to communicate issues related to an incident.
Tabletop Exercise
A discussion-based exercise where participants sit around a table and talk through one or more scenarios, such as a cyberattack or a natural disaster.
nmap
Network scanning tool for discovering hosts, services, and network information.
openssl
Open-source library for secure communication and cryptographic protocols.
grep
Command-line utility for searching text or patterns within files using regular expressions.
curl
Command-line tool for transferring data with URLs, supporting various protocols.
Head
Beginning or top part of a file or data stream, often used to display initial content.
Tail
Command-line utility displaying the last part of a file or data stream, often used for real-time log monitoring.
Scanless
command-line utility to perform port scans without active probing, aiming to avoid detection.
Reconstitution
Process of restoring systems/data to their original/functional state after a disruption or incident.
Precursors
Early indicators or warning signs preceding an event, used in identifying potential threats or vulnerabilities.
tracert
Command-line tool tracing data packet routes from source to destination, showing intermediate hops and response times.
netstat
Command-line utility displaying open network connections, routing tables, and interface statistics on a computer.
dig
Command-line tool querying DNS servers for domain information, IP addresses, DNS records, and name servers.
netcat
Command-line networking utility establishing TCP/UDP connections, sending/receiving data, and performing port scanning.
hping
Command-line utility for network packet manipulation and analysis, including sending custom packets like TCP, UDP, and ICMP packets from scratch and sending ping request with TCP, UDP packets
ipconfig/ifconfig
ipconfig-Displays network configuration information.
ifconfig-Displays and configures network interfaces.
ping
Sends echo requests to a designated machine to determine if communication is possible.
netcat
Command-line utility for networking tasks such as creating TCP or UDP connections, port scanning, transferring files, and debugging network protocols.
ARP command
Allows a system administrator the ability to see and manipulate the ARP cache on a system.
Cuckoo
A sandbox used for malware analysis
Dnsenum
Command-line utility for DNS enumeration and information gathering, including querying DNS records, identifying subdomains, and discovering DNS zone transfers.
route
Command-line utility to provide information on current routing parameters. Used to view and manipulate the IP routing table
Sn1per
an automated scanner designed to collect a large amount of information while scanning for vulnerabilities.
chmod
A Linux command used to change access permissions of a file.
logger
Command-line utility for logging messages to system logs, allowing users to record events, errors, and informational messages for troubleshooting and monitoring purposes.
PowerShell
Microsoft Windows-based task automation and configuration management framework, consisting of a command-line shell and scripting language.
dd
Data Dump
Command-line utility for data duplication, conversion, and manipulation, commonly used for creating disk images, copying data between devices, and performing low-level data operations.
WinHex
Software for hexadecimal editing, disk editing, and data recovery on Windows systems, offering tools for analyzing and manipulating binary data, disk structures, and file systems at a low level.