Deck E Prt. 2 Flashcards

1
Q

Operational Threat Intelligence

A

Is the DATA that is collected from Sources such as Humans, Social Media, & Chat Rooms as well as from Events that resulted in Cyberattacks. In this Process, the Analyst prepares a report that includes identified malicious activities, Recommended courses of Action, and Warnings for emerging Attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operational Threat Intelligence

A

Is obtained by Analyzing human behavior, threat groups, and so on. This Information Helps in Predicting Future Attacks and Thus Enhancing Incident Response Plans and Mitigation Strategies as required. Operational Threat Intelligence is generally in the Form of a report that Contains Identified Malicious Activities, Recommended Courses of action and warnings of emerging attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational Threat Intelligence

A

Is about Uncovering Specific Incoming Attacks before they happen. Most Operational Threat Intelligence Comes from Closed Sources, Although some threat actors discuss their plans via Social Media or Public Chat Rooms. Operational Threat Intelligence Provides Information about Specific Threats against the Organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PCI-DSS

A

Stands for Payment Card Industry-Data Security Standard. It is the Security Standard Applicable to a Credit Card Company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PGP

A

Is USED for Securing Email Messages. It is an Encryption Software, which is a FREE Implementation of the OpenPGP Standard that uses both Symmetric Key Cryptography & Asymmetric Key Cryptography for Improved Speed and Secure Key Exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pharming

A

USES Malicious Code to redirect users WEB Traffic. Once Redirected to these fake Websites, Users are prompted to enter personal Information, which is then used to commit Identify Theft or Financial Fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing Attack

A

Makes the Victim Open the Fraudulent email and click on the Malicious Attachment. This Results in the Malicious Attachment being downloaded and fileless malware being injected onto the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Preparation Phase

A

In The Incident Handling Process, the Preparation Phase is Responsible for Defining Rules, Collaborating with Human Workforce, Creating a back up Plan, and Testing the Plans for an Organizatoin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Promiscuous Mode

A

Is The Type of Configuration that allows a wired or Wireless Network Interface Controller to pass all the traffic it Receives to the CPU (Central Processing Unit), rather than passing only the Frames that the controller is intended to receive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public Key Cryptography

A

Examples of Public Key Cryptography are: PGP (Pretty Good Privacy), SSL (Secure Socket Layer), IKE (Internet Key Exchange).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SMTP Enumeration

A

In SMTP Enumeration, The TWO Internal Commands VRFY and EXPN Provide a confirmation of Valid Users, Email Addresses, Aliases, and Mailing Lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

STP Manipulation Attack

A

After Launching the STP Manipulation Attack the Attacker Creates a SPAN Entry on the Spoofed Root Bridge and Redirects the Traffic to his Computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scareware Attack

A

Scareware Attack try to Scare you with Something that is a Hoax. When a Pop UP Appears to a user stating that this computer may have been infected with spyware. Click here to install an Anti Spyware Tool to Resolve this issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spearphone Attack

A

EXPLOITS The Hardware of the Phone so the Attacker can Monitor the Loudspeaker Output from Data Sources such as Voice Assistants, Multimedia Messages, and Audio Files by using a Malicious App to breach Speech Privacy. The Spearphone Attack Breaches Speech Privacy by exploiting the motion Sensor accelerometer and capturing Speech Reverberations Generated through the Loudspeaker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Split DNS

A

Is a DNS Configuration in which the Organization has one DNS (Domain Name Server) in a DMZ (Demilitarized Zone) & a Second DNS Server on the Internal Network. A Split DNS Infrastructure is a Solution to the problem of using the same domain name for Internally and Externally Accessible Resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spoofed Session Flood Attack

A

Is Where the Attackers Create Fake or Spoofed TCP Sessions by Carrying Multiple SYN, ACK, & RST or FIN Packets. This Attack can bypass Firewalls.

17
Q

Syhunt Hybrid

A

Syhunt Hybrid a Security Scanner to Automate Web Application Security Testing and to Guard the Organizations Web Infrastructure Against Web Application Threats. The Analyst can use that Tool to Detect XSS, Directory Transversal Problems, Fault Injection, SQL Injection, Attempts to Execute Commands and several other Attacks.

18
Q

TCPTrace

A

Is a Tool that is Used to Analyze the Files Produced by several Packet Capture Programs such as TCPDump, WinDump, Wireshark, & EtherPeek. tcptrace is a free and open source tool for Analyzing TCP Dump Files.

19
Q

Test Automation

A

In Security Testing can accelerate Benchmark Tests and repeat them with a consistent Test setup. But it cannot Replace Manual testing completely.

20
Q

Trident

A

Is the Spyware that Can take Complete Control of the Target Mobile Device by Jailbreaking the Device Remotely and can record Audio, Capture Screenshots, and Monitor all Phone Calls and SMS messages.

21
Q

WPA3 Personal

A

Is a Wireless Security Protocol that Replaces the Personal PSK (Pre Shared Key) Authentication with SAE (Simultaneous Authentication of Equals) and is therefore resistant to offline Dictionary Attacks.

22
Q

Wardriving

A

Is the Wireless Attack in which the Hackers sit in the Parking lot and use Hacking Tools on their Laptop with the intention to find a Free Access Wireless Network.

23
Q

Web Of Trust

A

Is a Security Model in which every User in the Network Maintains a Ring of Public Keys. In this Model a User NEEDS to Encrypt a Message using the Receivers Public Key, and only the Receiver can Decrypt the message using their Private Key

24
Q

Worm

A

Is a Type of Malware that Spreads from one System to Another or from One Network to Another and Causes similar types of Damage as Viruses do to the Infected System

25
Q

zenmap -PP (Option)

A

(zenmap -PP) Is USED in Zenmap to perform an ICMP Timestamp Ping Scan to Acquire Information related to the Current time from the target Host Machine.