Cyber Sec 15 Flashcards

1
Q

3 What is typically not included in a pentesting Rules of Engagement?

A

The operating system the pentester may use
(Rules the pentester needs to follow|Test Scope|Permission to perform the test)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 What type of attack model is examplified in the image?(unfair)

A

Attack tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 When you find a vulnerability, ethical disclosure dictates that you should….

A

Report it to the relevant vender to allow them time to fix it before it is publicly published.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

6 Enumeration includes…..

A

Scanning hosts for open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

7 Which of the following is primarily a tool for exploiting vulnerable systems
Hydra|Nmap|SHODAN|Metasploit

A

Metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

10 A honeypot is….

A

A system or set of systems offered as bait to attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

11 A document which outlines the steps for handling a specific type of incident is called

A

A playbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

12 Someone working in a SOC with analysis of threats and incidents is called a…

A

Security analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

13 SPLUNK is an example of a

A

SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

14 A false positive is when an…

A

Alert is raised for benign event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

17 A technique used by malware to avoid detection is….

A

Polymorphism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

18 What is true about using virtual memory?

A

Uses a page table to map between virtual and physical memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

19 Metadata includes…

A

Time stamps and permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

20 What tool is used to prohibit a computer from writing anything to a disk?

A

Write blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

21 Cyber-enabled crime is…

A

a traditional crime that utilizes cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly