CISSP ch 17 Flashcards

1
Q

Incident

A

any event that has a negative effect on the confidentiality, integrity or availability of an organization’s assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

security incident

A

an incident that is the result of an attack or the result of malicious or intentional actions on the part of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incident management steps (7)

A

Detection

Response

Mitigation

Reporting

Recovery

Remediation

Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIRT or CSIRT

A

Computer incident response team

Computer security incident response team

the designated incident response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preventive control

A

attempts to thwart or stop unwanted or unauthorized activity from occurring

E.g., fences, locks, biometrics, separation of duties policies, job rotation policies, data classification, access control methods, encryption, smart cards, callback procedures, security policies, security awareness training, antivirus software, firewalls and intrusion preventions systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Detective control

A

attempts to discover or detect unwanted or unauthorized activity; operate after the fact

E.g., security guards, motion detectors, recording and reviewing events captured by security cameras or closed circuit television (CCTV), job rotation policies, mandatory vacation policies, audit trails, honeypots or honeynets, intrusion detection systems, violation reports, supervision and reviews of users and incident investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

C2 server / C&C

A

command and control server (botnet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DRDoS

A

distributed reflective denial-of-service = uses a reflected approach to an attack; doesn’t attack the victim directly but instead manipulates traffic or a network service so that the attacks are reflected back to the victim from other sources

E.g., DNS poisoning attacks, smurf attacks and fraggle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SYN flood attack

A

a common DoS attack = disrupts the standard three-way handshake used by the Transmission Control Protocol (TCP) to initiate the communication sessions = attackers send multiple SYN packets but never complete the connection with an ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP reset attack

A

spoofing the source IP address in a RST packet (reset) to disconnect active sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Smurf attack

A

another type of flood attack, but it floods the victim with Internet Control Message Protocol (ICMP) each packets instead of with TCP SYN packets = a spoofed broadcast ping request using the IP address of the victim as the source IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

fraggle attack

A

similar to smurf attacks, but instead of using ICMP, uses UDP packets over UDP ports 7 and 19 = will broadcast a UDP packet using the spoofed IP address of the victim, all systems on the network will then send traffic to the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ping flood attack

A

floods a victim with ping requests (e.g., sent from a botnet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MiTM attack

A

man-in-the-middle attack = on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IDS

A

Intrusion detection system = automates the inspection of logs and real-time system events to detect intrusion attempts and system failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDPS

A

Intrusion detection and prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IPS

A

Intrusion prevention system = placed inline with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Knowledge/signature based detection

A

pattern-matching detection = uses signatures similar to the signature definitions used by antimalware software

Low false positive rate

Only effective against known attack methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Behavior based detection

A

statistical intrusion detection = anomaly detection = heuristics-based detection = doesn’t use signatures, instead compares activity against baseline of normal performance to detect abnormal behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NOCs

A

network operations centers

a centralized location where computer, telecommunications, or satellite networks systems are monitored and managed 24x7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HIDS

A

host-based IDS = monitors a single computer or host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NIDS

A

network-based IDS = monitors a network by observing network traffic patterns

23
Q

SIEM

A

security information and event management

24
Q

SPAN port

A

Switched Port Analyzer port = port used for port mirroring (mirroring all traffic on the switch)

25
Q

RARP

A

Reverse Address Resolution Protocol = used by a NIDS to discover the source of an attack

26
Q

NIPS

A

network-based IPS

27
Q

Pseudo-flaws

A

false vulnerabilities or apparent loopholes intentionally implanted in a system in an attempt to tempt attackers

28
Q

IANA

A

Internet Assigned Numbers Authority = maintains a list of well-known ports matched to protocols

29
Q

WAF

A

web application firewall

30
Q

NGFW

A

next generation firewall

31
Q

UTM

A

unified threat management

32
Q

Security logs

A

Record access to resources such as files, folders, printers and so on

33
Q

System logs

A

Record system events such as when a system starts or stops, when services start or stop, or when service attributes are modified

34
Q

Application logs

A

Record information for specific applications

35
Q

Firewall logs

A

Record events related to any traffic that reaches a firewall

Includes traffic that the firewall allows and traffic that the firewall blocks

Commonly log packet information such as source and destination IP addresses and source and destination ports but not the packets’ actual contents

36
Q

Proxy logs

A

Record details such as what sites specific users visit and how much time they spend on these sites

Record when users attempt to visit known prohibited sites

37
Q

Change logs

A

Record change requests, approval and actual changes to a system as a part of an overall change management process

38
Q

FIPS 200

A

Minimum Security Requirement for Federal Information and Information Systems

39
Q

NTP

A

Network Time Protocol = used to ensure that logs have accurate timestamps

40
Q

SIEM tools

A

(security information and event management) tools

Provide centralized logging and real-time analysis of events occurring on systems throughout an organization

41
Q

Syslog protocol

A

used to send event notification messages

Defined in RFC 5424

A centralized syslog server receives syslog messages from devices on a network

The protocol defines how to format the messages and how to send them to the syslog server but not how to handle them

Historically been used in Unix and Linux systems

42
Q

syslog daemon

A

handles all incoming syslog messages, similar to how a SIEM server provides centralized logging

43
Q

clipping

A

a form of nonstatistical sampling; selects only events that exceed a clipping level, which is a predefined threshold for the event

44
Q

traffic / trend analysis

A

network flow monitoring = forms of monitoring that examine the flow of packets rather than actual packet contents

45
Q

rollover / circular logging

A

log cycling = allows administrators to set a maximum log size; when the log reaches that size, the system begins overwriting the oldest events in the log

45
Q

DLP techniques

A

data loss prevention techniques = used to detect or prevent data exfiltration

46
Q

Digital watermark

A

a secretly embedded marker in a digital file, doesn’t work if file is encrypted

47
Q

SOAR

A

Security orchestration, automation and response = a group of technologies that allow organizations to respond to some incidents automatically

48
Q

Playbook and Runbook

A

Playbook = a document or checklist that defines how to verify an incident and to respond

Runbook = implements the playbook data into an automated tool

49
Q

Cyber Kill Chain

A

created by Lockheed Martin)

Reconnaissance: Attackers gather information on the target

Weaponization: Attackers identify an exploit that the target is vulnerable to, along with methods to send the exploit

Delivery: Attackers send the weapon to the target via phishing attacks, malicious email attachments, compromised websites, or other common social engineering methods

Exploitation: The weapon exploits a vulnerability on the target system

Installation: Code that exploits the vulnerability then installs malware, the malware typically includes a backdoor, allowing the target to access the system remotely

Command Control: Attackers maintain a command and control system, which controls the target and other compromised systems

Actions on objectives: Attackers execute their original goals such as theft of money, theft of data, data destruction or installing additional malicious code such as ransomware

50
Q

TTPs

A

tactics, techniques and procedures

51
Q

Threat feed and threat intelligence feed

A

Threat feed = a steady stream of raw data related to current and potential threats

Threat intelligence feed = attempts to extract actionable intelligence from the raw data = examples of information:

Suspicious domains

Known malware hashes

Code shared on internet sites

IP addresses linked to malicious activity

52
Q

threat hunting

A

process of actively searching for cyber threats in a network