CEH Flashcards

1
Q

What is IT Risk?

A

Threat x Vuln x Impact = Risk, Threat x Vuln x Asset = Risk, is the probability that something negative might happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the five phases of hacking?

A

Reconnaissance which is the collecting information and learning about our target, examples are job posting survey, passive recon, and do some DNS queries. The scanning phases are the active part of the recon, check for open ports, vulnerability scan, and check service versions. Next phase is gaining access for example RCE attacks, password and injection attacks, session hijacking, etc. Next phase is maintaining access and live into the system, command and control systems. The last phase is to cover your tracks which is try not to be identified, check for log files,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the types of IoC?

A

Atomic, compute, and behavioral types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some categories of IoC?

A

Behavioral, Email, Network, and Host bases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DMZ and what it is used for?

A

A Demilitarized Zone is basically an area in your network that is facing outside from your internal network. The idea is to add a layer of security between your critical systems and servers that are more probable of being targeted, for example, a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some attack classifications?

A

Passive and active, close-in, insiders, and distributed attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the phases of Cyber Kill Chain?

A

Reconnaissance, weaponization, delivery, exploitation, installation, command and control (c2), and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information warfare types…

A

It uses information and communication technology to gain a competitive advantage over your adversary. C2 or C&C, intelligence-based (knowledge is power), electronic-based (signal jamming), psychological, hacker, economic, cyber-warfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Confidentiality

A

Is the effort of an organization to make sure data is kept private or secret. Breaches of confidentiality can be accidental or intentional/unintentional, however, to mitigate breaches, we can use access controls and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is integrity?

A

Is the effort to make sure the data has not been tampered with by making sure it is reliable, authentic and accurate. To promote integrity we can use hashing and digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is availability

A

Is the effort to make sure the data that needs to be consumed by authorized personnel, is accessible. We need to set some protections to prevent denial of services attacks, and natural disasters by promoting disaster recovery plans, backups, redundant systems, and other security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is authenticity

A

Is the quality, in terms of the data, of being legitimate or real.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is non-repudiation?

A

Is the assurance provided by the system to make sure the sender and receiver of data, cannot later deny having processed the data. We can use digital signatures to make sure the sender of an email, for example, cannot deny sending the email afterwards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the attacker’s motivation into hacking?

A

Curiosity, hackivism, revenge, bragging rights, cyber crime, terrorism, disruption of business, religious, and political.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the tactics, techniques, and procedures.

A

tactics are guiding principles, techniques is how you do it, procedures is more granularity from a higher level to a lower level. A tactic is the overall goal of the objective at hand. The techniques are the list of attacks that are going to be used to complete the tactics or the objectives. The procedure are the tools and programs used to proceed with the techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some common adversarial behaviors?

A

Internal recon, Powershell for data exfiltration, CLI/terminal tools such as cmd and bash, using HTTP user agent, web shell use,

17
Q

What is a DoS and a DDoS

A

A denial of service is an attack in which you flood a system or service into exhausting available resources, thus preventing other trusted consumers of those services, to get the service they need. A denial of service can be distributed by using a collection of bots or zombie systems into attacking a service at the same time.

18
Q

What is the risk level formula?

A

Impact x Probability = Risk Level, they are measured as Low, Medium, and High. Low is that a threat exists, however it is unlikely to occur and the impact is negligible. Medium threats are likely but not imminent, High is risk that needs to be addressed immediately.

19
Q

What are risk management and their phases?

A

Is the idea and process in managing in our organization keeping risk at an acceptable levels. We have the 1st phase: Identify the risks, assess the risks identified using likelihood and impact, then treat, mitigate, and control the risk down into a manageable levels.

20
Q

Cyber threat intelligence, what it means and their CTI types?

A

High levels such as Strategic, and Operational, and low-level such as Tactical, and Technical. CTI is any information that we can gather that helps an organization to identify, assess, monitor, and respond to cyber threats. Examples of CTI are indicators, events, TTP, and findings from the analysis of incidents.

21
Q

What are the threat modeling process?

A

Identify security objectives, and identify what needs to be secured, the second phase is the application overview which identifies roles, and usage scenarios (why), step three is decomposing the application, which is like the were, making a diagram of the ins and outs, how is data flowing in the systems. Step 4 is identifying the threats. Step 5 would be placing the vulnerabilities. Common models for threat modeling are STRIDE, PASTA, and DREAD threat modeling.