Cybersecurity Fundamentals Flashcards

1
Q

NIST: The Official publication series for standards and guidelines

A

FIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any potential danger to an asset

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A weakness in the system, design, implementation, software, or code, or the lack of a mechanism.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to a piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Referred to as the knowledge about an existing or emerging threat to assets, including networks and systems.

A

Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An express language designed for sharing of cyber-attack information. Details can contain data such as the IP addresses or domain names of command and control servers, malware hashes, and so on.

A

Structured Threat Information eXpression (STIX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An open transport mechanism that standardizes the automated exchange of cyber-threat information. TAXII was originally developed by MITRE and is now maintained by OASIS.

A

Trusted Automated eXchange of Indicator Information (TAXII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Free Standardized schema for specification, capture, characterization, and communication of events of stateful properties that are observable in the operational domain.

A

Cyber Observable eXpression (CybOX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An open framework for sharing threat intelligence in a machine-digestible format.

A

Open Indicators of Compromise (OpenIOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A language for the command and control of cyber-defense technologies. OpenC2 Forum was a community of cybersecurity stakeholders that was facilitated by the U.S. National Security Agency

A

Open Command and Control (OpenC2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

responsible for locating new files, disk space, or RAM to infect.

A

Search Routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This portion of the virus is responsible for copying the virus and attaching it to a suitable host

A

Infection Routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

allow the attacker full control over the system. Poison Ivy is an example of this type of Trojan.

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The idea behind this type of Trojan is to hide a user’s data.

A

Data Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These Trojans (Zeus is one such example) intercept and use a victim’s banking information for financial gain. Usually, they function as a transaction authorization number (TAN) grabber, use HTML injection, or act as a form grabber. The sole purpose of these types of programs is financial gain.

A

E-banking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Trojans

A

RAT
Data Hiding
E-Banking
DoS
Proxy
FTP
Security-Software Disablers

17
Q

Trojan infection mechanisms

A

P2P
Instant Messaging
Internet Relay Chat
Email Attachments
Physical access
Browser
SMS messages
Impersonated mobile apps
Watering hole
Freeware

18
Q

A Program used to cmbine two or more executables into a single packaged program

19
Q

Compress files like programs such as WinZip, Rar, and Tar

20
Q

software designed to install malware payloads on the victim’s system

21
Q

Function to encrypt of obscure the Code

22
Q

Ways to Distribute Malware

A

Wrapper
Packer
Dropper
Crypter

23
Q

A tool that uses TCP ACK packets as a covert communication channel

24
Q

Hackers can bypass SYN blocking rule by using what type of packet as a covert commuication channel

25
Designed to tunnel TCP traffic over a UDP connection
UDP Tunnel
26
dnscat
option for tunneling dat over an open dns connection
27
Malware Analysis that consists of decompiling, reverse engineering, and analysis of malicious software. | Focused on breaking down the software.
Static Analysis
28
A software reverse engineering tool developed by the U.S. National Security Agency.
Ghidra
29
Malware Analysis that consists of the monitoring and analysis of computer activity and Network traffic. | Monitor Computer Activity and Network Traffic
Dynamic Analysis
30
What type of SQL injection is where the attacker obtains the data by using the same channel that is used to inject the SQL code. Data is dumped directly int a web application or web page.
In-band SQL injection
31
What type of injection , the attacker retireves data using a different channel. For example, email, text, or an instant message.
Out-of-band SQL injection
32
With this type of injection, the attacker does not make the application display or transfer any data; rather, the attacker is able to reconstruct the information by sending specific statements and discerning the behavior of the application and database.
Blind SQL injection
33
a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
OWASP Top 10