Analysis Flashcards
Which standard uses divisions called security assurance levels to evaluate products?
Trusted Computer System Evaluation Criteria (TCSEC)
What type of IDS can recognize an attack made with the use of fragroute?
A host-based IDS
What happens when insurance is used to eliminate a risk?
Risk transference
What is the term for the process of identifying sets of vulnerabilities that can be used together to penetrate a network?
Vulnerability linkage
What are the three safeguards in a risk assessments?
Logical safeguards, administrative safeguards, and physical safeguards
Which tool is used to intercept, modify, and rewrite egress traffic destined for the specified host in such a way that a NIDS cannot recognize the attack signatures?
fragroute
Which type of attack can be prevented by using port security to create static ARP entries in the MAC table?
MAC flood attacks
Why would a hacker utilize alternate data streams (ADS)?
To hide malicious file content within a benign file
What type of attack changes the IP address to MAC address mappings on two other devices, such that the two devices send frames to the attacker when they think they are sending frames to one another?
ARP poisoning
When a router is examining a packet against an access control list and finds a traffic match, what action does the router take?
It takes the prescribed action and stops evaluating the packet
In a risk assessment, event logging and password management are examples of which type of safeguard?
Logical safeguards
What happens when no control is used to address a particular risk?
Risk acceptance
Which step in a penetration test is sometimes called “cleaning up”?
The last step involves returning any systems to their state prior to the pen test, which can include removing or cleaning up user accounts created externally as a result of the test
What is the term for the tool or process used to exploit a threat?
Threat vector
Which type of attack splits the attack payload into many packet fragments?
Session fragmentation
What is the term for a person who attempts to exploit a threat?
Threat agent
Which Common Criteria component defines a standard set of security requirements for a specific type of product?
Protection profile
Which version of the SPAN switch configuration sends traffic from multiple ports on multiple switches to a single switch port where the IDS is located?
Remote SPAN (RSPAN)
What is the purpose of the John the Ripper tool?
To crack weak passwords
Which standard uses levels called security functional requirements to assess security functionality?
Information Technology Security Evacuation Criteria (ITSEC)
In a risk assessment, data classification and background checks are examples of which type of safeguard?
Administrative safeguards
In a risk assessment, facility access control and equipment inventory are examples of which type of safeguard?
Physical safeguards
What is the purpose of the Snort tool?
Intrusion detection