comptia security Flashcards

1
Q

EAP

A

extensible authentication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.1X

A

802.1X is a network authentication protocol that opens ports for network access when an organization authenticates a user’s identity and authorizes them for access to the network. The user’s identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SRTP

A

secure real time transport protocol - to encrypt and provide authentication for RTP - real time transport protocol traffic - used for audio/video streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HIDS

A

host based intrusion detection system
sw installed on the system to detect attacks
HIPS - host based intrusion prevention system is an extension of a HIDS to detect and block attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HIPS

A

extension of HIDS // host based intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

mail gateway

A
  • is placed between an email server and the internet and it can filter out spam (spam filter)
  • typically includes DPL (data loss prevention) capabilities
  • can inspect the contents of outgoing traffic looking for key words and block any traffic containing proprietary data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

reverse proxy

A

protects an internal web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

media gateway

A

converts data from one format to another such as telephony traffic to IP-based traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

web application firewall

A

protects a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSID

A

service set identifier
A service set identifier (SSID) is a unique identifier assigned to a wireless network. It allows devices on the network to identify and connect to the correct network. Most SSIDs are case-sensitive and can be up to 32 characters long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WEP

A

wired equivalent privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WPA2

A

Wi-Fi protected access II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NAC

A

network access control - can inspect VPN clients for health status, e.g. having up to date OS and antivirus sw
after they connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PaaS

A

platform as a service - a cloud computing model that provides cloud customer with a preconfigured computing platform they can use as needed
- provides an easy to configure OS and on demand computing

–> IaaS and SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PAP

A

password authentication protocol - an older one where pwds are sent across the network in cleartext –> CHAP, MS-CHAPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

passive reconnaissance

A

a penetration testing method used to collect information, typically uses open-source intelligence –> active reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

pass the hash

A

pwd attack that captures and uses the pwd hash, attempts to log on as the user with the hash commonly associated with the Microsoft NTLM protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PBKDF2

A

pwd based key derivation function 2
- a key stretching technique that adds additional bits to a pwd as a salt
- it helps prevent brute force and rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NTLM

A

new technology LAN manager
a suite of protocols that provide confidentiality, integrity and authentication within Windows Systems
versions: NTLM, NTLMv2, NTLM2 Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

nonce

A

a number used once
cryptography elements frequently use a nonce to add randomness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

steganography

A

uses obfuscation to hide data within data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OCSP

A

online certificate status protocol
an alternative to using a CRL
allows to query a CA with the serial number of a certificate
CA answers with good, revoked, unknown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DLP

A

data loss prevention
can reduce the risk of emailing confidential info outside the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Saas

A

sw as a service provides sw or applications such as webmail via the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

TPM

A

trusted platform module
provides full drive encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

COPE

A

corporate owned personally enabled
mobile device deployment model

= MDM mobile device mgmt that gives centralized control over COPE
–> BYOD, CYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CYOD

A

choose your own device
a mobile device deployment model
employees can connect their personally owned device to the network as long as the device is on a preapproved list

=storage segmentation to protect company data on mobile devices owned by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

ISA

A

interconnection security agreement specifies technical and security requirements for planning, establishing, maintaining, and disconnecting a secure connection between two or more entities:
BETWEEN ANY FEDERAL AGENCY AND A THIRD PARTY INTERCONNECTING THEIR SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ALE

A

annual (annualized) loss expectancy
the expected loss for a year
it is used to measure risk with ARO and SLE in a quantitative risk assessment
SLE x ARO = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ARO

A

annual (annualized) rate of occurrence
the number of times a loss is expected to occur in a year
it is used to measure risk with ALE and SLE in a quantitative risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

SLE

A

single loss expectancy
the monetary value of any single loss
used to measure risk with ALE and ARO in a quantative risk assessment
SLE x ARO = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

S/MIME

A

secure/multipurpose internet mail extensions
popular standard used to secure email
provides:
confidentiality
integrity
authentication
non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

signature-based detection tool

A

type of monitoring used on intrusion detection and intrusion prevention systems
detects attacks based on KNOWN ATTACK PATTERNS documented as attack signatures
- signature based IDS systems use signatures similar to antivirus software

a unique identifier is established about a known threat so that the threat can be identified in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

SIEM

A

security information and event mgmt
attempts to look at security events throughout the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

sideloading

A

copying an app package to mobile device
useful to developers when testing apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

shimming

A

driver manipulation method
uses additional code to modify the behaviour of a driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Shibboleth

A

open source federated identity solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

SHA

A

secure hash algorithm
hashing function used to provide INTEGRITY
versions: SHA-1, SHA-2, SHA-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SFTP

A

secure file transfer protocol
TCP port 22
an extension of SSH (secure shell) used to encrypt FTP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

session hijacking

A

an attack that attempts to impersonate a user by capturing and using a session ID
session IDs are store in COOKIES!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

SED

A

self-encrypting drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

secure boot

A

process that checks and validates system files during the boot process
TPM typically uses a secure boot process

it is a security system offered by UEFI

it is designed to prevent a computer from being hijacked by a malicious OS

under secure book UEFI is configured with digital certs from valid OS vendors
the system fw checks the OS boot loader using the stored certificate to ensure that the OS vendor has digitally signed it
this prevents a boot loader that has been changed by malware or an OS installed without authorization from being used.

the TPM can also be invoked to compare hashes of key system state data (boot fw, boot loader, and OS kernel) to ensure they have not been tampered with by a rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

SAML

A

security assertion markup language
XML-based standard used to exchange authentication and authorization information between different parties
SAML provides SSO for web-based application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

SDN

A

software defined network
uses sw and virtualization technologies to replace hw routers
SDNs separate the data and control planes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

LDAP

A

lightweight directory access protocol
used to communicate with directories such as microsoft active directory
it identifies objects with query strings using codes such as CN=Users and DC=GetCertifiedGetAhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

LDAPS

A

lightweight directory access protocol secure
used to encrypt LDAP traffic with TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

bollards

A

short vertical posts that act as a baricade
block vehicles but not ppl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

HVAC

A

heating
ventilation
air conditioning
- physical security control that increases availability by regulating airflow within DCs and server rooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

RTO

A

recovery time objective
the max amount of time it should take to restore a system after an outage
it is derived from the max allowable outage time identified in the BIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

bcrypt

A

a key stretching algorithm
used to protect pwds
bcrypt salts pwds with additional bits before encrypting them with Blowfish
this thwarts rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

BIA

A

bussiness impact analysis
includes info on potential losses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

DRP

A

disaster recovery plan
includes methods to recover from an outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

symmetric encryption algorithms

A

AES - advanced encryption standard
DES - data encryption standard
RC4 - Rivest Cipher 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

hashing

A

provides integrity for digital signatures and other data
hash=checksum
hashing verifies integrity for data such as email, d/l files, and files stored on a disk
hash is a number created with a hashing algorithm
HASHES ARE ONE-WAY FUNCTIONS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

digital signature

A

is a hash of the message encrypted with the senders private key but the encryption doesnt provide integrity
the digital signature provides non-repudiation which doesnt provide integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

SHA-2

A

secure hash algorithm version 2
is used for integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

ECC

A

elliptic curve cryptography has minimal overhead and is often used with mobile devices for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

key stretching techniques

A

1) PBKDF2 = pwd-based key derivation function 2
2) bcrypt

that salt pwds with additional bits to protect agains brute force attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

OCSP

A

online certificate status protocol
provides real time responses to validate certs issues by a Certificate Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

CRL

A

certificate revocation list
includes a list of revokes certs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

DSA

A

digital signature algorithm
creates a digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

HMAC

A

hash based message authentication code
creates a hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

AUP

A

acceptable use policy
informs users of their responsibilities when using an organisations equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

cognitive pwd attack

A

utilizes information that a person would know eg name of a first pet and use it to change the users pwd

–> Sarah Palin example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

rainbow table attack

A

is a pwd attack that uses a DB of precalculated hashes
- PBKDF2 and bcrypt thwart rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

SRTP

A
  • secure real-time transport protocol
  • used to encrypt and provide authentication for RTP traffic
  • used for audio/video streaming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

honeynet

A

group od servers configured as honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

an 802.1x server

A

provides port-based authentication and can authenticate clients
clients that cant authenticate (eg guests) can be redirected to the guest network which grants them Internet access but not access to the internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

NAT

A

network address translation
translates private IP addresses to public IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

PEAP

A

protected extensible authentication protocol
an extension of EAP
sometimes used with 802.1x
PEAP requires a cert on the 802.1x server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

PEM

A

privacy enhanced mail
common format for PKI certs
it can use either CER (ASCII) or DER (binary) formats and can be used for almost any type of certs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

chroot

A

Linux command used to change the root directory
often used for sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

chmod

A

linux admins use it to change permissions for files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

FDE

A

full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

SED

A

self-encrypting drive
a drive that includes the hw and sw necessary to encrypt a hard drive
- users typically enter credentials to decrypt and use the drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

runtime code # compiled code

A

runtime code = code that is interpreted when it is executed

compiled code = has been optimized by an application and converted into an executable file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

RADIUS

A

remote authentication dial-in user service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

DNS

A

domain name system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

DHCP

A

dynamic host configuration protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

SCADA

A

supervisory control and data acquisition system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

trojans

A

commonly create backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

spear phishing

A

eg email targeting users in the same organisation

83
Q

vishing

A

similar to phishing - but uses telephone technology

84
Q

salting

A

method used to prevent brute force attacks to discover pwds

85
Q

account lockout control

A

locks an account after the wrong pwd is guessed too many times

86
Q

DNS poisoning

A

domain name system poisoning
attempts to redirect web browsers to malicious URLs

87
Q

replay attack

A

attempts to capture packets to impersonate one of the parties in an online session

88
Q

SLA

A

service level agreement
between a company and a vendor that stipulates performance expectations such as min uptime and max downtime levels

89
Q

BPA

A

business partners agreement

90
Q

MOU/MOA

A

memorandum of understanding or memorandum of agreement - a type of agreement that defines responsibilities of each party
- compare with ISA

91
Q

ISA

A

interconnection security agreemenr
specifies technical and security requirements for connections between two or more entities

92
Q

arp (not ARP)

A

a command-line tool to show and manipulate ARP (address resolution protocol) cache

93
Q

ARP poisoning

A

an attack that misleads systems about the actual MAC address of the system

94
Q

XSS attack

A

cross-site scripting attack
protection against:
- input validation
- WAF: web application firewall = monitors, filters, and or blocks HTTP traffic to a web server

95
Q

normalization

A

organising tables and columns in a DB to reduce redundant data and improve overall DB performance

96
Q

netcat

A

useful for remotelly administering servers but it doesnt collect and analyze packets
- can be used for banner grabbing and will provide info on the operating system

97
Q

protocol analyzer=sniffer

A

can capture traffic sent over a network and identify the type of traffic , the source of the traffic and protocol flags used within individual packets
to EXAMINE PACKETS
used to VIEW DATA sent in CLEAR TEXT

98
Q

fault tolerance

A

the capability of a system to suffer a fault, but continue to operate
the system can tolerate the fault as if it never occurred

99
Q

RAID

A

a redundant array of inexpensive disks
row cost solution for fault tolerance for disks
RAID increases data availability

100
Q

load balancing

A

round-robin is one of the methods used in load balancing

101
Q

rainbow table

A

a file containing precomputed hashes for character combination
rainbow tables are used to discover pwds

102
Q

bcrypt

A

a key stretching technique designed to protect against brute force and rainbow table attacks

103
Q

PBKDF2

A

pwd based
key derivation
function 2

both (bcrypt as well) salt the pwd with additional bits

bcrypt- based on Blowfish

104
Q

confusion (in the context of encryption)

A

means that the ciphertext is significantly different than the plaintext

105
Q

diffusion (cryptography)

A

ensures that small changes in the plaintext result in large changes in the ciphertext

106
Q

obfuscation

A

attempt to hide data or make sth unclear

107
Q

collision

A

hashing algorithm vulnerability
a has vulnerability that can be used to discover pwds
a hash collision occurs when two different pwds CREATE THE SAME HASH

108
Q

ECDHE

A

elliptic curve diffie-hellman ephemeral
allows entities to negotiate encryption keys securely over a public network

109
Q

CASB

A

cloud access security broker

  • sw tool that enforces cloud-based security requirements
  • placed between the organisation’s resources and the cloud
  • monitors all network traffic
  • can enforce security policies
110
Q

CTM

A

counter mode
a mode of operation used for encryption that combines IV with a counter
the combined result is used to encrypt blocks

111
Q

pinning

A

a security mechanism used by some web sites to PREVENT WEB SITE IMPERSONATION

web sites provide clients with a list of PUBLIC KEY HASHES

clients store the list and use it to validate the web site

112
Q

stapling

A

the process of appending a digitally signed OCSP response to a certificate

it reduces the overall OCSP traffic sent to a CA

113
Q

perfect forward secrecy

A

a characteristic of encryption key ensuring THAT THE KEYS ARE RANDOM

perfect forward secrecy methods do not use DETERMINISTIC ALGORITHMS

114
Q

IPsec (internet protocol security)
TLS (transport layer security)
often use

A

HMAC-MD5
HMAC-SHA1

HMAC= hash-based message authentication code

115
Q

hashing algorithms

A

MD5
SHA
HMAC
RIPEMD

116
Q

RIPEMD

A

race integrity promitives evaluation message digest

117
Q

SHA

A

secure hash algorithm

118
Q

MD5

A

message digest 5

119
Q

IV

A

initialization vector provides a starting value for a cryptographic algorithm

it is a fixed-size random or pseudo-random number that helps create random encryption keys

ideally the IV should be large enough so that the algorithm doesnt reuse the same IV and re-create the same encryption keys

120
Q

RADIUS

A

remote authentication dial-in user service

encrypts pwd packets

uses shared keys for symmetric encryption

when users authenticate, RADIUS servers and clients use the shared key to encrypt and decrypt data exchanged in a CHALLENGE/RESPONSE session

without the shared key, clients are unable to decrypt the data and respond appropriately

121
Q

RTO

A

recovery time objective
= the amount of time it takes to identify a problem and then perform recovery eg restore from back up or switch in an alternative system

122
Q

RPO

A

recovery point objective
the amount of data loss that a system can sustain measured in time

if a virus destroys a DB an RPO of 24 hours means that the data can be recovered from a backup copy to a point not more than 24 hours before the DB was infected

123
Q

MTBF

A

mean time between failure

expected lifetime of a product before it fails and must be replaced or repaired

124
Q

MTTR

A

mean time to repair
mean time to recover
is a measure of the time taken to correct a fault to restore the system to full operation

often specified in the maintenance contracts

125
Q

virtual machine escape vulnerabilities

A

most severe issue that may exist in a virtualized environment

the attacker can access a single virtual host and then leverages that access to intrude on the resources assigned to a different virtual machines

126
Q

DATA REMNANT

A

the residual representation of digital data that remains even after attempts have been made to remove it or erase it

127
Q

VIRTUALIZATION SPRAWL

A

when the number of virtual machines on a network reaches a point where the administrator can no longer manage them effectively

128
Q

virtual machine migration

A

moving a virtual machine from
one physical hardware environment to the other

129
Q

syslog

A

system logging protocol
port 514
is a way network devices can use a standard message format to communicate with a logging server

designed to make it easy to monitor network devices

devices can use a syslog agent to send out notification messages

130
Q

nslookup

A

used to query the Domain Name System to obtain the mapping between a domain name and an IP address or to view other DNS records
“set type=ns” tells nslookup only reports information on name servers

“set type=mx” -> info only about mail exchange servers

131
Q

risk

A

results from the combination of
a THREAT and a VULNERABILITY

132
Q

BCP

A

bussiness continuity plan

133
Q

credentialed scan

A

logs into a system and retrieve their configuration information

134
Q

non-credentialed scan

A

relies on external resources for config settings that can be altered or incorrect

135
Q

TACACS+

A

is an extension to TACACS =
terminal access controller access control system

developed as a proprietary protocol by Cisco

136
Q

RADIUS

A

REMOTE AUTHENTICATION DIAL-in USER SERVICE
is a networking protocol that operates on port 1812 and provides centralized Authentication
Authorization
Accounting mgmt
for users who connect and use a network service

137
Q

KERBEROS

A

a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT

138
Q

CHAP

A

challenge-handshake authentication protocol is used to authenticate a user or network host to an authenticating entity

AUTHENTICATION PROTOCOL
DOES NOT PROVIDE AUTHORIZATION OR ACCOUNTING SERVICES

139
Q

the simplest load balancing scheduling algorithm

A

round-robin

140
Q

affinity

A

a scheduling method used with load balancers
it uses the clients IP address to ensure the client is redirected to the same server during a session

141
Q

Shibboleth

A

one of the federated identity solutions
open source and freely available
includes Open libraries written in C++ and Java

142
Q

OAuth

A

open standard for authorization
instead of creating a diff account for each web site you access, you can often use the same account that you have created with Google, FB, paypal etc

143
Q

OpenID Connect

A

works with OAuth 2.0
allows clients to verify the identity of end users without managing their credentials

exemple Skyscanner - after logging using FB credentials Skyscanner provides more personalized experience for the users

144
Q

TFTP

A

trivial file transfer protocol
port 69

145
Q

SMTP

A

simple mail transfer protocol
port 25

146
Q

DNS

A

domain name service
protocol port 53

147
Q

IDOR

A

insecure direct object references

cybersecurity issue when a web app developer uses an identifier for direct access to an object but provides no additional access control and/or authorization checks

148
Q

race condition

A

sw vulnerability when the resulting outcome from execution processes is directly dependent on the order and timing of certain events
those events fail to execute in the order and timing intended by the developer - hacker gamer example !!

149
Q

IMAP

A

internet message access protocol
a TCP/IP application protocol that provides a means for a client to access email messages stored in a mailbox on a remote server using TCP port number 143
unlike POP3 messages persist on the server after the client has d/l them
IMAP also supports mailbox mgmt functions such as creating subfolders and access to the same mailbox by more than one client at the same time

150
Q

dereferencing

A

attempts to access a pointer that references an object at a particular memory location

151
Q

WEP

A

wired equivalent privacy
an older mechanism for encrypting data sent over a wireless connection

uses 24-bit initialization vector to secure its pre-shared key

replaced by WPA -wifi protected access
that uses RC4 cipher and a temporal key integrity protocol (TKIP)

replaced by WPA2 after the completion of the 802.11i security standard
uses improved AES cipher with counter mode with cipher-block chaining message authentication protocol CCMP for encryption

replaced by WPA3 most secure wireless encryption method
uses the simultaneous authentication of equals SAE to increase the security of preshared keys
provides the enhanced open mode

WPA3 Enterprise mode supports AES with the Galois/counter mode protocol GCMP-256 for the highest levels of encryption

152
Q

measured boot

A

a feature where a log of all boot actions is taken and stored in a trusted platform module for later retrieval and analysis by anti-malware sw on a remote server

153
Q

master boot record analytics

A

used to capture the hard disks required information to support a forensic investigation
it would not detect malware during the systems boot-up process

154
Q

startup control

A

determines which programs will be loaded when the operating system is initially booted

155
Q

risk response acctions

A

accept
avoid
mitigate or
transfer

156
Q

FTP

A

file transfer protocol
port 20 and 21

157
Q

data anonymization

A

is the process of removing personally identifiable information from data sets so that the ppl whom the data describe remain anonymous

158
Q

hybrid pwd cracking approach

A

combining diff methods such as the dictionary and brute force methods into a single tool

159
Q

proximity badge

A

embeds an RFID chip into the card or badge
when the user swipes their card over the reader, it sends an RF signal that uniquely identifies the cards holder

RFID - radio-frequency identifcation systems

160
Q

RFID attacks

A

attacks against radio-frequency identification systems

such as

eavesdropping
replay
DoS

161
Q

access control vestibule

A

physical security access control system
comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens

162
Q

VDI

A

virtual desktop infrastructure

163
Q

VPC

A

virtual private cloud

164
Q

UEBA

A

user and entity behaviour analytics

can provide an automated identification of suspicious activity by user accounts and computer hosts

165
Q

ABAC

A

attribute-based access control

provides most detailed and explicit type of access control over a resource because it is capable of making access decisions based on a combination of subject and object attributes, as well as context-sensitive or system-wide attributes

info such as the group membership, the OS being used or even the machines IP could be considered when granting or denying access

166
Q

order of volatility

A

order in which you should collect evidence

167
Q

legal hold

A

process that an organization uses to perserve all forms of potentially relevant information when litigation is pending or reasonably anticipated

168
Q

access control model with a network switch if it requires multilayer switches to use authentication via RADIUS/TACACS+

A

you need to use 802.1x for the protocol

the IEEE 802.1x standard is a network authentication protocol that opens ports for network access when an organization authenticates a user’s identity and authorizes them for access to the network
this defines port security
the users identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server

169
Q

nmap

A

the worlds most popular open-source scanning utility

170
Q

services. msc

A

the services console allows to disable or enable Windows services

171
Q

dd tool

A

used to copy files, disks, and partitions, and it can also be used to create forensic disk images

172
Q

Nessus

A

proprietary vulnersbility scanner developed by Tenable
it does contain the ability to conduct a port scan, its primary role is as a VULNERABILITY SCANNER

173
Q

LDAPS

A

provides mutual authentication of the client and the server
- because its using TLS

174
Q

the five factors of authentication

A

knowledge - sth you know
possession - sth you have
biometric - sth you are
action - sth you do
location - somewhere you are

175
Q

PHI

A

protected health information

any info that identifies so as the subject of medica and insurance records, plus their associated hospital and laboratory test results

this type of data is protected by the Health Insurance Portability and Accountability Act = HIPAA

it requires notification of thr individual, the Secretary of the US Department of Health and Human Services -HHS, and the media if more than 500 individuals are affected in the case of a data breach

176
Q

credit card information is protected under

A

the PCI DSS information security standard

177
Q

war walking

A

walking around a build while locating WIRELESS networks and devices

it will not help find a WIRED ROGUE DEVICE
on wired network
- checking valid MAC addresses against a known list
- scanning for new systems or devices
- physically surveying for unexpected systems
can be used to find rogue devices on a WIRED NETWORK

178
Q

ICMP

A

internet control message protocol

179
Q

nbtstat

A

diagnostic tool for NetBIOS over TCP/IP
used to troubleshoot NetBIOS name resolution problems

180
Q

harvesting

A

process of gathering data, normally user credentials

181
Q

SOW

A

statement of work

182
Q

MSA

A

master service agreement
parties agree to the terms that wil govern future transactions/future agreements

183
Q

SLA

A

service level agreement

outlines the detailed terms
under which a service is provided
including reasons the contract may be terminated

184
Q

pass the hash = PtH

A

is the process of harvesting an account’s cached credentials when the user logs in to a single sign-on

185
Q

golden ticket

A

a Kerberos ticket that can grant other tickets in an Active Directory environment
attackers who can createna golden ticket can use it to grant admin access to other domain members even to domain controllers

186
Q

lateral
movement

A

an umbrella term for variety of attack types
compromising host credentials

187
Q

pivoting

A

attackers compromise one central host
- the pivot
that allows them to spread out to other hosts that would otherwise be inaccessible

188
Q

CSMA/CA

A

carrier-sense multiple access with collision avoidance

is a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be idle

189
Q

IoC

A

indicators of compromise

190
Q

degausser

A

used to wipe magnetic media

191
Q

TTX

A

tabletop exercise:

RED TEAM - the adversary, attempting to penetrate the network or exploit it as a rogue internal attacker

BLUE TEAM - consists of system administrators, cybersecurity analysts and network defenders

192
Q

MECM

A

microsoft endpoint configuration mgmt

provides remote control
patch mgmt
sw distribution
OS deployment
network access protection
hw & sw inventory

193
Q

SaaS

A

sw as a service
any sw or application provided to users over a network such as the internet

eg Gmail

194
Q

private IP addresses

A

10.x.x.x
172.16-31.x.x
192.168.x.x

195
Q

ATP ATTACK

A

An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.[1][2] In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.

196
Q

CVSS

A

common
vulnerability
score
system

197
Q

OSINT

A

open-source
intelligence –>
refers to legally gathered information from free, public sources = information found on the internet

198
Q

TCP

A

Transmission Control Protocol
Transmission Control Protocol (TCP) is a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

199
Q

FDE

A

full disk encryption

200
Q

CVE

A

common vulnerabilities & exposures

201
Q

IoCs

A

indicators of compromise:
telltale
signs that an attcack has taken place
may include:
- file signatures
- log patterns
- etc
- may be found in file and code repositories

202
Q

OSINT

A

open source threat inteligence

203
Q

CISA

A

cybersecurity & infrastructure security agency