CyberBook2 Flashcards
Following log is an example of
https://www.comptia.org/contact-us/%3file..%324322fpasswd
what attack is this?
Directory transversal
What is a known security risk associated with data archives that contain financial information?
Data becomes a liability if archived longer than required by regulatory guidance.
Policy that provides greater depth and breadth of knowledge across an orgnaization?
Job rotation policy.
Tokenization of credit card information of a public cloud proider.
Cloud Access Security Broker (CASB)
Two subnets that should be able to communicate with each other directly. What should be deployed so server admins can access these devices?
Jump Servers
Security analysis required deploy workstations in a room where data cannot be stored. File share is in local data center. What should be implemented?
VDI and thin clients.
What prevents employees from visiting inappropriate websites?
AUP
What tool can be used to scan a network to perform vulnerability checks and compliance auditing.
Nessus
Which of the following protocols is commonly used to collect information about CPU utilization and memory usage from network devices?
Simple Network Management Protocol (SNMP)
A type of report that shows controls are in place to protect customer data. Usally from third-party vendors and CISO may request this report.
Soc 2 Type Report
A type of scan that provides calculated value for known vulnerabilities.
CVSS; Common Vulnerability Scoring System
What provides a current state or image of VM’s state.
Snapshot
Command to see which ports on a network are in a listening state.
Netstat
Tool used to facilitate incident response threat hunting and security configuration both standalone and integrated with SIEM.
SOAR; Security Orchestration Automation Response.
What is something that redirects you when clicking on a link that you didnt intend to go to, for instance (bank payments)
XSRF-CSRF