Chapter 1 Missed Questions Flashcards
Which protocol is a common Command-and-Control mechanism for botnets?
IRC Protocol
Where do file-less viruses store themselves in order to maintain persistence?
Windows Registry
What security technology best assists with automation of security workflows?
- IPS
- SIEM
- SOAR
- CASB
SOAR
What type of approach to threat identification begins with a listing of all resources owned by the organization?
An Asset Focused approach
What type of artificial intelligence technique is most commonly associated with optimization?
Prescriptive analytics
What CVSS value is the threshold at which PCI DSS requires remediation to achieve a passing scan?
4
This is a layer 2 attack where the attacker sends messages to corrupt the ARP table and causes packets to be misrouted. (This is done to set up a MitM attack)
ARP Poisoning
This attack floods the table with addresses, making the switch unable to find the correct address for a packet
MAC Flooding
This is a layer 3 attack where the attacker sends a large number of connection requests to open network services
SYN Flooding
This is a layer 3 attack where the attacker attempts to manipulate the source or destination IP address of network traffic
IP Spoofing
What is an IV (Initialization Vector) used for in a wireless communication protocol?
The IV is used in wireless systems as the randomization element at the beginning of a connection
What is considered the most secure current encryption protocol used in securing HTTPS sessions?
TLS 1.3
What is the condensed penetration process?
Planning, Discovery, Attack, Reporting
What is the dark web?
The dark web uses obfuscation methods to restrict access, requires TOR, and uses onion routing (.onion instead of .com, etc.)
What is the deep web?
Websites that are not indexed by traditional search engines and require additional methods of access or authentication are considered to be part of the ‘deep web’
What type of attack method did Morris finger worm, Code Red, and Slammer use to compromise systems?
Buffer Overflow
What is an SQL injection?
Code injection attacks that can be used to bypass login forms by tricking a web application into evaluating a statement that is always true. ‘password is correct OR 1=1’ can be used to login without credentials
What can be used to stop SQL injections?
Input Filtering
What is Sentiment Analysis?
A technique used to identify and track patterns in human emotions, opinions, or attitudes that may be present in data
Difference between Phishing, Vishing, Smishing, Spim, and Spam?
Phishing - Scam E-Mails Vishing - Scam Phone Calls Smishing - Scam Text Messages (SMS) Spim - Spam Instant Messaging Spam - Unsolicited communication sent in bulk