Analysis Flashcards

1
Q

Which standard uses divisions called security assurance levels to evaluate products?

A

Trusted Computer System Evaluation Criteria (TCSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of IDS can recognize an attack made with the use of fragroute?

A

A host-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens when insurance is used to eliminate a risk?

A

Risk transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the term for the process of identifying sets of vulnerabilities that can be used together to penetrate a network?

A

Vulnerability linkage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three safeguards in a risk assessments?

A

Logical safeguards, administrative safeguards, and physical safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which tool is used to intercept, modify, and rewrite egress traffic destined for the specified host in such a way that a NIDS cannot recognize the attack signatures?

A

fragroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of attack can be prevented by using port security to create static ARP entries in the MAC table?

A

MAC flood attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why would a hacker utilize alternate data streams (ADS)?

A

To hide malicious file content within a benign file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of attack changes the IP address to MAC address mappings on two other devices, such that the two devices send frames to the attacker when they think they are sending frames to one another?

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When a router is examining a packet against an access control list and finds a traffic match, what action does the router take?

A

It takes the prescribed action and stops evaluating the packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a risk assessment, event logging and password management are examples of which type of safeguard?

A

Logical safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens when no control is used to address a particular risk?

A

Risk acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which step in a penetration test is sometimes called “cleaning up”?

A

The last step involves returning any systems to their state prior to the pen test, which can include removing or cleaning up user accounts created externally as a result of the test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the term for the tool or process used to exploit a threat?

A

Threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of attack splits the attack payload into many packet fragments?

A

Session fragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the term for a person who attempts to exploit a threat?

A

Threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which Common Criteria component defines a standard set of security requirements for a specific type of product?

A

Protection profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which version of the SPAN switch configuration sends traffic from multiple ports on multiple switches to a single switch port where the IDS is located?

A

Remote SPAN (RSPAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of the John the Ripper tool?

A

To crack weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which standard uses levels called security functional requirements to assess security functionality?

A

Information Technology Security Evacuation Criteria (ITSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a risk assessment, data classification and background checks are examples of which type of safeguard?

A

Administrative safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a risk assessment, facility access control and equipment inventory are examples of which type of safeguard?

A

Physical safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of the Snort tool?

A

Intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which type of attack splits the attack payload into many small packets?

A

Session splicing

25
Q

Which international standard establishes a baseline of confidence in the security functionality of IT products, and includes protection profiles and evaluation assurance levels?

A

Common Criteria

26
Q

Which type of scanning operates proactively to locate issues, utilizes automated processes, and scans and identifies vulnerabilities of all systems present on the network?

A

Vulnerability scanning

27
Q

When an IDS or IPS is examining a packet against an access control list and finds a traffic match, what action does the device take?

A

It continues to examine the packet after a match is found to identify any additional rules the packet might match.

28
Q

What happens when a control is implemented to reduce the impact of a risk?

A

Risk mitigation

29
Q

What is the term for a weakness or error that can lead to a compromise?

A

Vulnerability

30
Q

What is the process called when an IDS reassembles small packets before performing expression matching?

A

Session reconstruction

31
Q

What job role is in charge of addressing physical risks to the facility?

A

Facilities manager

32
Q

What is the most efficient protection control against a social engineering attack?

A

End-user training

33
Q

Which file system is susceptible to an attack that uses alternative data streams?

A

NTFS

34
Q

What is the goal of session fragmentation and session splicing attacks?

A

To evade detection by the IDS

35
Q

Which type of attack exploits the TCP handshake process?

A

SYN flood

36
Q

What is the purpose of a security audit?

A

It evaluates how well a company adheres to its stated security policy

37
Q

Which type of attack sends many frames with bogus MAC addresses as the source?

A

MAC flood attack

38
Q

What should you do when no known workaround exists to eliminate a Linux kernel vulnerability?

A

Upgrade the kernel immediately

39
Q

How do you prevent rule files from loading when snort is started?

A

Open the snort.config file and comment out all of the rules you do not wish to use

40
Q

What is the purpose of the nmap tool?

A

Port scanning

41
Q

What is the purpose of a post-mortem in a security audit?

A

It evaluates the execution of the security plan. It is also called a lessons learned session

42
Q

Which attack is based on changing the IP address to host name mapping?

A

DNS poisoning

43
Q

What is the purpose of the Tripwire tool?

A

To check the integrity of system files

44
Q

What is the term for a vulnerability that exists that has the potential to be exploited, as compared to a vulnerability that exists but has no chance of being exploited?

A

Threat

45
Q

How can a hacker take advantage of alert threshold settings to avoid detection?

A

By ping scanning very slowly

46
Q

Which impact needs to be considered before implementing a security audit?

A

The impact on performance

47
Q

What is the ultimate goal of a MAC flood attack?

A

To fill the MAC table with nonexistent MAC addresses, causing the switch to flood all frames out all interfaces and allowing the attacker to receive frames normally not allowed to see

48
Q

Which feature can be enabled on a switch to prevent MAC flooding and MAC spoofing?

A

Port security

49
Q

What is the term for risk that still exists after security controls have been applied?

A

Residual risk

50
Q

In which stage of the Secure Software Development Lifecycle is the platform and programming language chosen?

A

Design phase

51
Q

What happens when an organization decides to cease an activity or process that creates a risk?

A

Risk avoidance

52
Q

Which attack uses a multitude of infected computers known as zombies or bots?

A

DDoS attacks

53
Q

What vulnerability tool is specifically designed to locate potential exploits in the products from Microsoft?

A

Microsoft Baseline Security Analyzer (MBSA)

54
Q

What job role is in charge of ensuring systems and information assets for a unit are used to accomplish business objectives?

A

Business or functional manager

55
Q

Which configuration on a switch sends all traffic to the port on which the IDS is located?

A

Switched Port Analyzer (SPAN) feature

56
Q

Which file contains the options for the configuration of the Snort tool?

A

snort.config

57
Q

Which Common Criteria component defines how thoroughly the product is tested?

A

Evaluation Assurance Level (EAL)

58
Q

In which stage of the Secure Assurance Maturity Model lifecycle are components and libraries built?

A

Construction stage

59
Q

Which type of device is targeted by MAC flood attacks?

A

Switches