BTL1 Flashcards

1
Q

What is AAA control methods?

A

AAA stands for Authentication, Authorization and Accountability. Which is an important security principle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ICMP and what is it used for?

A

Internet Control Message Protocol - is an internet layered protocol used by network devices to diagnose network communication issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI reference model acronym for top to bottom

A

All People Seem To Need Data Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI reference model acronym for bottom to top

A

Please Do Not Throw Sausage Pizza Away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Dig and NSlookup?

A

These are command line tools, used to query DNS servers for information about a specific domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Netstat?

A

This is a command-line tool that monitors the TCP and UDP connections on your host system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Nmap?

A

Network Mapper used for performing Network Discovery. It’s capable of revealing ports, discovering devices on a network, revealing running services, identifying operating systems, and many other functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ports - What are ‘well known ports’

A

These range from 0 to 1023 and are some of the most common ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ports - Registered ports

A

Range from 1024 to 49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ports - Private ports

A

Range from 49152 to 65535 - these are typically used for “ephemeral” ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a risk?

A

A negative impact on practically anything i.e., business, financial, security, there are many areas where risk may reside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a vulnerability?

A

A vulnerability is a weakness that can be exploited by a threat. Vulnerabilities can be managed whereas a threat cannot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SMTP stand for and what port does it use?

A

Simple Message Transfer Protocol uses port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is POP3 stand for

A

Post Office Protocol, which is an application layer protocol used by email clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is CKC (Cyber Kill Chain)

A

This is a framework developed by Lockheed Martin in 2011 and it is an intelligence defence model for the identification and prevention of cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is threat exposure checks?

A

A threat exposure check is when an analyst uses multiple tools such as SIEM and EDR to look for the presence of any indicators of compromise they have retrieved from intelligence vendors, information sharing partners, government alerts, or OSINT sources.

17
Q

What is attribution?

A

The process of identifying the source of a cyberattack, including the perpetrator’s identity, motives, and affiliations

18
Q

What is DFIR?

A

Digital Forensic Incident Response

19
Q

What are the steps in DFIR?

A

Identification, Preservation, Collection, Analysis and Reporting

20
Q

What if file carving?

A

File carving is a process of searching for files in a data stream and is used to carve deleted files from disk images.

21
Q

What is meta data

A

This is data about data, for example when you right click on a word documents and look at the properties/details tab.

22
Q

What is memory analysis?

A

Refers to the analysis of volatile data in a computer’s memory dump.

23
Q

What is Pagefile.sys?

A

This is when MS Windows OS stores data from RAM when it becomes full.

24
Q

What are hash values?

A

Unique fingerprints of a file or string.