Chapter 1 Flashcards
What is the CIA triad?
Confidentiality (prevent unauthroized access to information or systems)
Integrity (prevent unauthroized modification of information or systems)
Availability (ensure use of information and systems is possible)
What is the DAD triad?
Disalde
Disclosure (gain unauthorized access)
Alteration (make unauthorized changes)
Denial (prevent legit use of systems and info)
What are the four stages of the CompTIA Penetration
Test?
Planning and
Scoping
(
Information
Gathering and
Vulnerability
Scanning
Attacking and
Exploiting
Reporting and
Communicating
Results
What are the steps in The Cyber Kill Chain?
Reconnaissance.
(
Weaponization.
(
Delivery.
(
Exploitation.
(
Installation.
(
Command and control.
(
Actions on Objectives.
(
What is Reconnaissance in the cyber kill chain?
(Attackers gather open source intelligence and conduct initial scans of target environment
What is Weaponization in the cyber kill chain?
Attackers develop a specific
attack tool designed to exploit the vulnerabilities identified during reconnaissance.
What is Delivery in the cyber kill chain?
Attackers next must deliver that malware to the target. (Network vuln, social enginnering, infected USB, sending as email attachment,
What is Exploitation in the cyber kill chain?
The malware gains access to the targeted system. Victim opens a malicious file or when the attacker exploits a vulnerability over the network or otherwise gains a foothold on the target
What is Installation in the cyber kill chain?
The attacker uses the
initial access provided by the malware to establish permanent, or persistent, access to the
target system. (Making a backdoor
What is Command and Control in the cyber kill chain?
After getting permanent access the attacker may use a remote shell or other means to control the system.
They can control it manually or may connect an automated command-and-control (C2C) network that provides it with instructions.
What is Actions on Objectives in the cyber kill chain?
Attacker uses the system to advance the original objectives of their attack. (theft, use of resources, mine crypto, modification or deletion of information.
Tom is running a penetration test in a web application and discovers a flaw that allows
him to shut down the web server remotely.
What goal of penetration testing has Tom most
directly achieved?
A. Disclosure
B. Integrity
C. Alteration
D. Denial
D. Denial
Brian ran a penetration test against a school’s grading system and discovered a flaw that
would allow students to alter their grades by exploiting a SQL injection vulnerability.
What
type of control should he recommend to the school’s cybersecurity team to prevent students
from engaging in this type of activity?
A. Confidentiality
B. Integrity
C. Alteration
D. Availability
B. Integrity
Edward Snowden gathered a massive quantity of sensitive information from the National
Security Agency and released it to the media without permission.
What type of attack
did he wage?
A. Disclosure
B. Denial
C. Alteration
D. Availability
A. Disclosure
Assuming no significant changes in an organization’s cardholder data environment, how
often does PCI DSS require that a merchant accepting credit cards conduct penetration testing?
A. Monthly
B. Semiannually
C. Annually
D. Biannually
C. Annually
(or after any significant change in the cardholder data environment)