CYBER 160 Module 2~ Threat management and cybersecurity resources Flashcards

1
Q

type of test that exploits vulnerabilites just as a threat actor would and gain unauthorized access

A

pen test or penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

monetary reward given for uncovering a software vulnerability

A

bug bounty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

limitations or parameters in a penetration test

A

rules of engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

returning all system back to normal following a penetration test

A

clean up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

gathering information from outside the organization

A

footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

directly probing for vulnerabilities and useful information

A

active reconsissance

Ex: unprotected wireless data transmissions from wireless local area networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

searching for wireless signals from an automobile or on foot using a portobale computing device

A

war driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

efficient means of discovering a Wi-Fi signals using drones

A

war flying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

searching online for publicly accessible information

A

passive reconnissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

publicly accessible informaiton

A

open source intelligence (OSINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

frequent and ongoing process often automated that continuously identifies vulnerabilities risks and monitors cybersecurity progress

A

vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

valid authentication credentials such as username and password which are supplied to vulnerability scanners to mimic the work of a threat actor who posses the credentials

A

credential scan

Type of major vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

vulnerability scan that provides no authentication information to the tester

A

non-credential scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

vulnerability scan that attempts to employ any vulnerabilities which it finds like threat actors

A

intrusive scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

vulnerability scan that does not attempt to exploit the vulnerabilities but only records that of what it discovered

A

nonintrusive scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

tool that identifies vulnerabilities in an operating system and application software the most popular

A

Common Vulnerabilities and Exposure (CVE)

17
Q

numbering rating system of the impact of vulnerabilities

A

Common Vulnerability Scoring System (CVSS)

18
Q

tool that consolidates real-time securtity monitoring and management of security information with analysis and reporting security events

A

Security Information and Event Management (SIEM)

software that runs on a computer

19
Q

interpretation and classificaiton of emotions (pos,neg,neutral) with in text data using text analysis techniques

A

sentiment analysist

20
Q

designed to help security teams manage and respond to security warnings and alarms

A

Security Orchestration Automation and Responce

21
Q

proactively searching for cyber threats that have gone undetected in a network

A

threat hunting

22
Q

data feeds of information of the latest threats

A

threat feeds

23
Q

a place of information from enterprises and government used to share information on the latest attacks

A

fusion center

24
Q

series of documented process used to define policies and process for implementing and managing security controls in enterprise enviroments

25
Most common frameworks
NIST,ISO,AICPA,CIS,CSA ## Footnote NIST= National Institute of Standard and Technology ISO= Intern Organization for Standardization AICPA= American Institute of Certificate Public Accountats CIS= Center of Internet Security CSA= Cloust Security Alliance
26
guidance document designed to help organizations access and manage risks to their information and systems
NSIT Management Framework (RMF)
27
used as a measuring stick companies can use to compare their cybersecurity practices to the threats they face
NIST Cybersecurity Framework (CSF)
28
created NIST cybersecurity framework for helping private companies identify, detect and respond to cyber attacks
NIST (national institure of standards of Technology)
29
typically developed by established proffesional organizations or government agencies using the expertise of seasoned security proffesional
Industry regulations
30
document approved through consensus by a recognized standardization body
standard
31
database of behavior of threat actors and how they orchestrate and manage attacks
adversary tactics,techniques and procerdures (TTP)
32
white paper document which are authored by technology bodies employing speacilist,engineers,scientist who are experts in those areas
Request for comments (RFCs)
33