Cyber Sec 15 Flashcards
3 What is typically not included in a pentesting Rules of Engagement?
The operating system the pentester may use
(Rules the pentester needs to follow|Test Scope|Permission to perform the test)
4 What type of attack model is examplified in the image?(unfair)
Attack tree
5 When you find a vulnerability, ethical disclosure dictates that you should….
Report it to the relevant vender to allow them time to fix it before it is publicly published.
6 Enumeration includes…..
Scanning hosts for open ports
7 Which of the following is primarily a tool for exploiting vulnerable systems
Hydra|Nmap|SHODAN|Metasploit
Metasploit
10 A honeypot is….
A system or set of systems offered as bait to attackers
11 A document which outlines the steps for handling a specific type of incident is called
A playbook
12 Someone working in a SOC with analysis of threats and incidents is called a…
Security analyst
13 SPLUNK is an example of a
SIEM
14 A false positive is when an…
Alert is raised for benign event
17 A technique used by malware to avoid detection is….
Polymorphism
18 What is true about using virtual memory?
Uses a page table to map between virtual and physical memory
19 Metadata includes…
Time stamps and permissions
20 What tool is used to prohibit a computer from writing anything to a disk?
Write blocker
21 Cyber-enabled crime is…
a traditional crime that utilizes cyber