CYBER 160 Module 2~ Threat management and cybersecurity resources Flashcards

1
Q

type of test that exploits vulnerabilites just as a threat actor would and gain unauthorized access

A

pen test or penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

monetary reward given for uncovering a software vulnerability

A

bug bounty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

limitations or parameters in a penetration test

A

rules of engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

returning all system back to normal following a penetration test

A

clean up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

gathering information from outside the organization

A

footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

directly probing for vulnerabilities and useful information

A

active reconsissance

Ex: unprotected wireless data transmissions from wireless local area networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

searching for wireless signals from an automobile or on foot using a portobale computing device

A

war driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

efficient means of discovering a Wi-Fi signals using drones

A

war flying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

searching online for publicly accessible information

A

passive reconnissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

publicly accessible informaiton

A

open source intelligence (OSINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

frequent and ongoing process often automated that continuously identifies vulnerabilities risks and monitors cybersecurity progress

A

vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

valid authentication credentials such as username and password which are supplied to vulnerability scanners to mimic the work of a threat actor who posses the credentials

A

credential scan

Type of major vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

vulnerability scan that provides no authentication information to the tester

A

non-credential scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

vulnerability scan that attempts to employ any vulnerabilities which it finds like threat actors

A

intrusive scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

vulnerability scan that does not attempt to exploit the vulnerabilities but only records that of what it discovered

A

nonintrusive scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

tool that identifies vulnerabilities in an operating system and application software the most popular

A

Common Vulnerabilities and Exposure (CVE)

17
Q

numbering rating system of the impact of vulnerabilities

A

Common Vulnerability Scoring System (CVSS)

18
Q

tool that consolidates real-time securtity monitoring and management of security information with analysis and reporting security events

A

Security Information and Event Management (SIEM)

software that runs on a computer

19
Q

interpretation and classificaiton of emotions (pos,neg,neutral) with in text data using text analysis techniques

A

sentiment analysist

20
Q

designed to help security teams manage and respond to security warnings and alarms

A

Security Orchestration Automation and Responce

21
Q

proactively searching for cyber threats that have gone undetected in a network

A

threat hunting

22
Q

data feeds of information of the latest threats

A

threat feeds

23
Q

a place of information from enterprises and government used to share information on the latest attacks

A

fusion center

24
Q

series of documented process used to define policies and process for implementing and managing security controls in enterprise enviroments

A

framework

25
Q

Most common frameworks

A

NIST,ISO,AICPA,CIS,CSA

NIST= National Institute of Standard and Technology
ISO= Intern Organization for Standardization
AICPA= American Institute of Certificate Public Accountats
CIS= Center of Internet Security
CSA= Cloust Security Alliance

26
Q

guidance document designed to help organizations access and manage risks to their information and systems

A

NSIT Management Framework (RMF)

27
Q

used as a measuring stick companies can use to compare their cybersecurity practices to the threats they face

A

NIST Cybersecurity Framework (CSF)

28
Q

created NIST cybersecurity framework for helping private companies identify, detect and respond to cyber attacks

A

NIST (national institure of standards of Technology)

29
Q

typically developed by established proffesional organizations or government agencies using the expertise of seasoned security proffesional

A

Industry regulations

30
Q

document approved through consensus by a recognized standardization body

A

standard

31
Q

database of behavior of threat actors and how they orchestrate and manage attacks

A

adversary tactics,techniques and procerdures (TTP)

32
Q

white paper document which are authored by technology bodies employing speacilist,engineers,scientist who are experts in those areas

A

Request for comments (RFCs)

33
Q
A