CySA+ 100 Flashcards
What are the three key objectives of information security?
Confidentiality, integrity, and availability (CIA)
Risk exists at the intersection of _______ and _________.
Threats and vulnerabilities.
What is the overall risk rating for a risk that has medium likelihood and high impact?
High
What type of system controls access to a network based on criteria such as time of day, location, device type, and system health?
Network access control (NAC)
What are the three networks typically connected to a triple-homed firewall?
The Internet, an internal network, and a DMZ
What is the TCP port for the HTTP protocol?
80
What is the TCP port for the HTTPS protocol?
443
What are the four types of firewalls?
Packet filters, stateful inspection firewalls, next-generation firewalls, and web application firewalls.
______ may be used to apply settings to many different Windows systems at the same time.
Group Policy Objects (GPOs)
What are the four phases of penetration testing?
Planning, Discovery, Attack, and Reporting
What type of software can you use to enumerate the services that are accepting network connections on a remote system without probing that system for vulnerabilities?
Port scanner
What is the range of well-known ports?
0–1023
What is the range of registered ports?
1024–49151
What is the most commonly used port scanner?
nmap
What Cisco logging level indicates a critical event?
2
What service is responsible for resolving domain names to IP addresses?
DNS
What tool can be used to determine the path between two systems over the Internet?
Traceroute or tracert, depending on the operating system
What service allows you to look up the registered owner of a domain name?
whois
What type of data analysis looks for differences from expected behaviors?
Anomaly analysis
What type of data analysis predicts threats based on existing data?
Trend analysis
What regulation requires vulnerability scans for organizations involved in credit card processing?
PCI DSS
What regulation requires vulnerability scanning for federal government agencies?
FISMA
What type of vulnerability scan leverages read-only access to the scan target?
Credentialed scan
What term is used to describe an organization’s willingness to tolerate risk?
Risk appetite
What type of account should be used to perform credentialed vulnerability scans?
Read-only account
What function is performed by QualysGuard, Nessus, Nexpose, and OpenVAS?
Vulnerability scanning
What is the purpose of Nikto and Acunetix?
Web application scanning
What criteria should be used in prioritizing the remediation of vulnerabilities?
Criticality, difficulty, severity, and exposure
What industry-standard system is used to assess the severity of security vulnerabilities?
CVSS
What are the CVSS score ranges?
Under 4.0 is low, 4.0–5.9 is medium, 6.0–9.9 is high, and 10.0 is critical.
What is the term used to describe when a scanner reports a vulnerability that does not really exist?
False positive
What type of vulnerability allows an attacker to place more data into an area of memory than is allocated for a specific purpose?
Buffer overflow
What type of attack seeks to increase the level of access that an attacker has to a targeted system?
Privilege escalation
What type of attack allows an attacker to run software of his or her choice on the targeted system?
Arbitrary code execution
What is the current secure standard for providing HTTPS encryption?
TLS 1.2 or later
In what type of attack does the attacker sends spoofed DNS requests to a DNS server that are carefully designed to elicit responses that are much larger in size than the original requests?
DNS amplification
What term is used to describe any observable occurrence in a system or network that relates to a security function?
Security event
What term is used to describe a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices?
Security incident
What are the phases of incident response?
Preparation; Detection & Analysis; Containment, Eradication, & Recovery; and Post-Incident Activity
What type of documents provide the detailed, tactical information that CSIRT members need when responding to an incident?
Procedures