Attack Frameworks Flashcards

1
Q

Which framework was developed by Lockheed Martin to identify and prevent cyber intrusions

A

Cyber kill chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which framework is a 4 Step model of adversary ) capabilities, infrastructure and victims

A

Diamond model of intrusion analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which framework focuses on real-life tactics and techniques of attacks?

A

Mitre attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which framework is focused on testing the security of an organization and analyze it?

A

Open source security testing methodology manual ( OSS tmm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which testing guide is for testing the security of web applications?

A

OWASP testing guide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are standardized steps to take after an incident has happened

A

Playbooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A non-technical training exercise that prepares you for when an incident does happen

A

Tabletop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the phases or steps of the post incident activity

A

Forensic analysis
Root cause analysis
Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are key performance indicators and metrics?

A

Trends
Top 10
Zero-days
Service level objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some things that should be mentioned during an incident reporting?

A

Executive summary
Who what when where why
Timeline
Scope
Evidence
Impact
Recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name a few communication channels that should be involved during an incident report

A

. Legal personnel
Public relations
Media
Law enforcement
Regulatory reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of control is put in place to temporarily satisfy

A

Compensating control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the control types

A

Managerial
Operational
Technical
Preventative
Detective
Responsive
Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure coding best practices

A

Input validation
Output encoding
Session management
Authentication
Data protection
Parametrized queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A path to find threats and the security systems

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 4 different ways to handle riskmanagement

A

Accept
Transfer
Avoid
Mitigate