ch 13 Flashcards

1
Q

A systematic and methodical evaluation of the security posture of the enterprise
It examines the exposure to attackers, forces of nature, and any potentially harmful entity

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of inventorying items with economic value

A

Asset identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List potential threats that come from threat agents

A

Threat evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Goal: understand attackers and their methods

Often done by constructing threat scenarios

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides visual representation of potential attacks

Drawn as an inverted tree structure

A

Attack tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Determine current weaknesses
Takes a snapshot of current organization security
Every asset should be viewed in light of each threat

A

Vulnerability appraisal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determine damage that would result from an attack

Assess the likelihood that the vulnerability is a risk to organization

A

Risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Determine what to do about risks

Determine how much risk can be tolerated

A

Risk mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tool available to perform vulnerability assessments:

A

• Vulnerability Assessment Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Involves information exchange between one system’s program and another system’s corresponding program

A

T C P/I P communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A unique identifier for applications and services

16 bits in length

A

• Port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Searches system for port vulnerabilities
Used to determine port state
Open, closed, or blocked

A

Port scanner software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hardware or software that captures packets to decode and analyze contents
Also known as sniffersers

A

Protocol analyzers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A generic term for a range of products that look for vulnerabilities in networks or systems

A

Vulnerability scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– sends “probes” to network devices and examine the responses received back to evaluate whether a specific device needs remediation

A

Active scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

– can identify the current software OS and applications being used on the network and indicate which devices might have a vulnerability

A

Passive scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a computer protected by minimal security
Intentionally configured with vulnerabilities
Contains bogus data files

A

Honeypot:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a network set up with one or more honeypots

Set up with intentional vulnerabilities

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a message that a service transmits when another program connects to it

A

Banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

when a program is used to intentionally gather this information
Can be used as an assessment tool to perform an inventory on the services and systems operating on a server

A

Banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intended to break (“crack”) the security of a system

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

(W P A)

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Designed to test the security of a wireless L A N system by attempting to break its protections of Wi-Fi Protected Access (W P A) or W P A 2

A

Wireless cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what does the cmd ping do

A

tests the network connection between two entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what does the cmd netstat do

A

displayed detailed information on the device communicating between each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what does the cmd tracert

A

shows the path that a packet takes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what does the cmd nslookup

A

queries the DNS to obtain a specific domain name or IP address or IP address mapping

28
Q

what does the cmd dig do

A

linux command line alternative to nslookup

29
Q

what does the cmd arp

A

view and modify addresses resolution protocol cache

30
Q

what does the cmd ipconfig do

A

displayes all current TCP/IP network configuration values and refreshes DHCP and DNS settings

31
Q

what does the cms ifconfig

A

linux implimentations of ipconfig

32
Q

what does the cmd tcpdump do

A

linux command line protocol analyzer

33
Q

Nmap

A

(network mapper)

34
Q

A security vulnerability scanner that can determine which devices are connected to the network

A

Nmap (network mapper)

35
Q

A command-line alternative to Nmap

Can be used by itself or driven by other programs and scripts (read or write)

A

Netcat

36
Q

Used to replicate attacks during a vulnerability assessment

Provides a structure of exploits and monitoring tools

A

Exploitation framework

37
Q

A technology that hides the existence of data in a seemingly harmless data file, image file, audio file, or video file

A

Steganography

38
Q

Can be used to determine if data is hidden well enough to thwart unauthorized users from finding the data

A

Steganography assessment tools

39
Q

An automated software search through a system for known security weaknesses
Creates a report of potential exposures
Should be compared against baseline scans

A

Vulnerability scan

40
Q

A scan looks to

A

Identify vulnerabilities or security weaknesses found in the system
Identify a lack of security controls that are missing to establish a secure framework
Identify common misconfigurations (in hardware and software)

41
Q

attempts to actually penetrate the system to perform a simulated attack

A

Intrusive vulnerability scan

42
Q

uses only available information to hypothesize the status of the vulnerability

A

Non-intrusive vulnerability scan

43
Q

Provides credentials (username and password) to the scanner so tests for additional internal vulnerabilities can be performed

A

Credentialed vulnerability scan

44
Q

Designed to exploit system weaknesses
Relies on tester’s skill, knowledge, cunning
Usually conducted by independent contractor

A

• Penetration Testing

45
Q

End result: • Penetration Testing

A

penetration test report

46
Q

tester has no prior knowledge of network infrastructure

A

Black box test

47
Q

tester has in-depth knowledge of network and systems being tested

A

White box test

48
Q

some limited information has been provided to the tester

A

Gray box test

49
Q

• Penetration Testing Once inside the network

Tester attempts to perform

A

pivot (moving around inside the network)

50
Q

The state or condition of being free from public attention to the degree that you determine

A

• Privacy

51
Q

Standard techniques for mitigating and deterring attacks

Creating a security posture

A

• Secure Methodology

52
Q

Elements that make up a security posture

A
Initial baseline configuration
Standard security checklist
Systems evaluated against baseline
Continuous security monitoring
Regularly observe systems and networks
Remediation
53
Q

what security goal has encryption, steganography, access controls

A

confidentiality

54
Q

what security goal has, hashing, digital signatures, certificates, nonrepudiation, tools

A

integrity

55
Q

what security goal has redundancy, fault tolerance, patching

A

safety

56
Q

Can be configured to detect attacks and sound alarms, or prevent attacks

A

Information security controls

57
Q

lock unlocks doors automatically upon failure

A

Fail-open

58
Q

lock automatically locks

A

Fail-safe

59
Q

Types of hardening techniques include

A

Protecting accounts with passwords
Disabling unnecessary accounts
Disabling unnecessary services
Protecting management interfaces and applications

60
Q

It is important to provide information regarding events that occur
So that action can be taken

A

• Reporting

61
Q

Sound warning if specific situation is occurring

A

Alarms or alerts

62
Q

Can help ensure proper data handling

A

Data sensitive labeling

63
Q

O S “delete”

A

(Purging) command

64
Q

overwriting the disk space with zeros or random data

A

Wiping

65
Q

permanently destroys the entire magnetic-based drive

By reducing or eliminating the magnetic field

A

Degaussing