ch 13 Flashcards

1
Q

A systematic and methodical evaluation of the security posture of the enterprise
It examines the exposure to attackers, forces of nature, and any potentially harmful entity

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of inventorying items with economic value

A

Asset identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List potential threats that come from threat agents

A

Threat evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Goal: understand attackers and their methods

Often done by constructing threat scenarios

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides visual representation of potential attacks

Drawn as an inverted tree structure

A

Attack tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Determine current weaknesses
Takes a snapshot of current organization security
Every asset should be viewed in light of each threat

A

Vulnerability appraisal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determine damage that would result from an attack

Assess the likelihood that the vulnerability is a risk to organization

A

Risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Determine what to do about risks

Determine how much risk can be tolerated

A

Risk mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tool available to perform vulnerability assessments:

A

• Vulnerability Assessment Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Involves information exchange between one system’s program and another system’s corresponding program

A

T C P/I P communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A unique identifier for applications and services

16 bits in length

A

• Port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Searches system for port vulnerabilities
Used to determine port state
Open, closed, or blocked

A

Port scanner software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hardware or software that captures packets to decode and analyze contents
Also known as sniffersers

A

Protocol analyzers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A generic term for a range of products that look for vulnerabilities in networks or systems

A

Vulnerability scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– sends “probes” to network devices and examine the responses received back to evaluate whether a specific device needs remediation

A

Active scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

– can identify the current software OS and applications being used on the network and indicate which devices might have a vulnerability

A

Passive scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a computer protected by minimal security
Intentionally configured with vulnerabilities
Contains bogus data files

A

Honeypot:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a network set up with one or more honeypots

Set up with intentional vulnerabilities

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a message that a service transmits when another program connects to it

A

Banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

when a program is used to intentionally gather this information
Can be used as an assessment tool to perform an inventory on the services and systems operating on a server

A

Banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intended to break (“crack”) the security of a system

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

(W P A)

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Designed to test the security of a wireless L A N system by attempting to break its protections of Wi-Fi Protected Access (W P A) or W P A 2

A

Wireless cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what does the cmd ping do

A

tests the network connection between two entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what does the cmd netstat do
displayed detailed information on the device communicating between each other
26
what does the cmd tracert
shows the path that a packet takes
27
what does the cmd nslookup
queries the DNS to obtain a specific domain name or IP address or IP address mapping
28
what does the cmd dig do
linux command line alternative to nslookup
29
what does the cmd arp
view and modify addresses resolution protocol cache
30
what does the cmd ipconfig do
displayes all current TCP/IP network configuration values and refreshes DHCP and DNS settings
31
what does the cms ifconfig
linux implimentations of ipconfig
32
what does the cmd tcpdump do
linux command line protocol analyzer
33
Nmap
(network mapper)
34
A security vulnerability scanner that can determine which devices are connected to the network
Nmap (network mapper)
35
A command-line alternative to Nmap | Can be used by itself or driven by other programs and scripts (read or write)
Netcat
36
Used to replicate attacks during a vulnerability assessment | Provides a structure of exploits and monitoring tools
Exploitation framework
37
A technology that hides the existence of data in a seemingly harmless data file, image file, audio file, or video file
Steganography
38
Can be used to determine if data is hidden well enough to thwart unauthorized users from finding the data
Steganography assessment tools
39
An automated software search through a system for known security weaknesses Creates a report of potential exposures Should be compared against baseline scans
Vulnerability scan
40
A scan looks to
Identify vulnerabilities or security weaknesses found in the system Identify a lack of security controls that are missing to establish a secure framework Identify common misconfigurations (in hardware and software)
41
attempts to actually penetrate the system to perform a simulated attack
Intrusive vulnerability scan
42
uses only available information to hypothesize the status of the vulnerability
Non-intrusive vulnerability scan
43
Provides credentials (username and password) to the scanner so tests for additional internal vulnerabilities can be performed
Credentialed vulnerability scan
44
Designed to exploit system weaknesses Relies on tester’s skill, knowledge, cunning Usually conducted by independent contractor
• Penetration Testing
45
End result: • Penetration Testing
penetration test report
46
tester has no prior knowledge of network infrastructure
Black box test
47
tester has in-depth knowledge of network and systems being tested
White box test
48
some limited information has been provided to the tester
Gray box test
49
• Penetration Testing Once inside the network | Tester attempts to perform
pivot (moving around inside the network)
50
The state or condition of being free from public attention to the degree that you determine
• Privacy
51
Standard techniques for mitigating and deterring attacks | Creating a security posture
• Secure Methodology
52
Elements that make up a security posture
``` Initial baseline configuration Standard security checklist Systems evaluated against baseline Continuous security monitoring Regularly observe systems and networks Remediation ```
53
what security goal has encryption, steganography, access controls
confidentiality
54
what security goal has, hashing, digital signatures, certificates, nonrepudiation, tools
integrity
55
what security goal has redundancy, fault tolerance, patching
safety
56
Can be configured to detect attacks and sound alarms, or prevent attacks
Information security controls
57
lock unlocks doors automatically upon failure
Fail-open
58
lock automatically locks
Fail-safe
59
Types of hardening techniques include
Protecting accounts with passwords Disabling unnecessary accounts Disabling unnecessary services Protecting management interfaces and applications
60
It is important to provide information regarding events that occur So that action can be taken
• Reporting
61
Sound warning if specific situation is occurring
Alarms or alerts
62
Can help ensure proper data handling
Data sensitive labeling
63
O S “delete”
(Purging) command
64
overwriting the disk space with zeros or random data
Wiping
65
permanently destroys the entire magnetic-based drive | By reducing or eliminating the magnetic field
Degaussing