CompTIA CySA+ CS0-003 Deck 8 Flashcards
Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.
Hash
The theoretically indecipherable fixed-length output of the hashing process.
(SPF)
Sender Policy Framework
(SPF) Sender Policy Framework
A DNS record identifying hosts authorized to send mail for the domain.
(DKIM)
Domain Keys Identified Mail
(DKIM) Domain Keys Identified Mail
A cryptographic authentication mechanism for mail utilizing a public key published as a DNS record.
(DMARC)
Domain-based Message Authentication, Reporting, and Conformance
(DMARC) Domain-based Message Authentication, Reporting, and Conformance
A framework for ensuring proper application of SPF and DKIM, utilizing a policy published as a DNS record.
Impossible Travel
A tracking of information such as GPS address, IP address, or user’s device to pinpoint a user’s location and determine whether a behavior was physically possible.
This provides a cryptographic authentication mechanism for DNS and supplements SPF.
DKIM, or Domain Keys Identified Mail
What PowerShell command is often used by attackers to download malicious files and scripts from a web server?
Download String
(DDoS attack)
Distributed Denial of Service Attack
(DDoS attack) Distributed Denial of Service Attack
An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with requests or response traffic.
Traffic Spike
A sharp increase in connection requests in comparison with a baseline.
Beaconing
A means for a network node to advertise its presence and establish a link with other nodes, such as the beacon management frame sent by an AP. Legitimate software and appliances do this, but it is also associated with Remote Access Trojans (RAT) communicating with a Command & Control server.
(IRC)
Internet Relay Chat
(IRC) Internet Relay Chat
A group communications protocol that enables users to chat, send private messages, and share files.
ARP Spoofing / ARP Poisoning
A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.
Rogue Device
An unauthorized device or service, such as a wireless access point DHCP server, or DNS server, on a corporate or private network that allows unauthorized individuals to connect to the network.
Non-Standard Port
Communicating TCP/IP application traffic, such as HTTP, FTP, or DNS, over a port that is not the well-known or registered port established for that protocol.
Mismatched Port/Application Traffic
Communicating non-standard traffic over a well-known or registered port.
What type of malware typically results in high volumes of traffic saturating switches and router interfaces?
Worm
What describes regular host communication to a remote C&C system?
Beaconing
How does 802.1x help protect against rogue devices?
Answers will vary. 802.1x limits network access to only pre-authorized devices.
Privilege Escalation
The practice of exploiting flaws in an operating system or other application to gain a greater level of access than was intended for the user or application.