Cybersecurity Fundamentals Flashcards

1
Q

NIST: The Official publication series for standards and guidelines

A

FIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any potential danger to an asset

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A weakness in the system, design, implementation, software, or code, or the lack of a mechanism.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to a piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Referred to as the knowledge about an existing or emerging threat to assets, including networks and systems.

A

Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An express language designed for sharing of cyber-attack information. Details can contain data such as the IP addresses or domain names of command and control servers, malware hashes, and so on.

A

Structured Threat Information eXpression (STIX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An open transport mechanism that standardizes the automated exchange of cyber-threat information. TAXII was originally developed by MITRE and is now maintained by OASIS.

A

Trusted Automated eXchange of Indicator Information (TAXII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Free Standardized schema for specification, capture, characterization, and communication of events of stateful properties that are observable in the operational domain.

A

Cyber Observable eXpression (CybOX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An open framework for sharing threat intelligence in a machine-digestible format.

A

Open Indicators of Compromise (OpenIOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A language for the command and control of cyber-defense technologies. OpenC2 Forum was a community of cybersecurity stakeholders that was facilitated by the U.S. National Security Agency

A

Open Command and Control (OpenC2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

responsible for locating new files, disk space, or RAM to infect.

A

Search Routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This portion of the virus is responsible for copying the virus and attaching it to a suitable host

A

Infection Routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

allow the attacker full control over the system. Poison Ivy is an example of this type of Trojan.

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The idea behind this type of Trojan is to hide a user’s data.

A

Data Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These Trojans (Zeus is one such example) intercept and use a victim’s banking information for financial gain. Usually, they function as a transaction authorization number (TAN) grabber, use HTML injection, or act as a form grabber. The sole purpose of these types of programs is financial gain.

A

E-banking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Trojans

A

RAT
Data Hiding
E-Banking
DoS
Proxy
FTP
Security-Software Disablers

17
Q

Trojan infection mechanisms

A

P2P
Instant Messaging
Internet Relay Chat
Email Attachments
Physical access
Browser
SMS messages
Impersonated mobile apps
Watering hole
Freeware

18
Q

A Program used to cmbine two or more executables into a single packaged program

A

Wrapper

19
Q

Compress files like programs such as WinZip, Rar, and Tar

A

Packers

20
Q

software designed to install malware payloads on the victim’s system

A

Droppers

21
Q

Function to encrypt of obscure the Code

A

Crypters

22
Q

Ways to Distribute Malware

A

Wrapper
Packer
Dropper
Crypter

23
Q

A tool that uses TCP ACK packets as a covert communication channel

A

AckCMD

24
Q

Hackers can bypass SYN blocking rule by using what type of packet as a covert commuication channel

A

TCP ACK

25
Q

Designed to tunnel TCP traffic over a UDP connection

A

UDP Tunnel

26
Q

dnscat

A

option for tunneling dat over an open dns connection

27
Q

Malware Analysis that consists of decompiling, reverse engineering, and analysis of malicious software.

Focused on breaking down the software.

A

Static Analysis

28
Q

A software reverse engineering tool developed by the U.S. National Security Agency.

A

Ghidra

29
Q

Malware Analysis that consists of the monitoring and analysis of computer activity and Network traffic.

Monitor Computer Activity and Network Traffic

A

Dynamic Analysis

30
Q

What type of SQL injection is where the attacker obtains the data by using the same channel that is used to inject the SQL code. Data is dumped directly int a web application or web page.

A

In-band SQL injection

31
Q

What type of injection , the attacker retireves data using a different channel. For example, email, text, or an instant message.

A

Out-of-band SQL injection

32
Q

With this type of injection, the attacker does not make the application display or transfer any data; rather, the attacker is able to reconstruct the information by sending specific statements and discerning the behavior of the application and database.

A

Blind SQL injection

33
Q

a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

A

OWASP Top 10