Domain 4 Flashcards

1
Q

Control

A

High level description of a feature or activity that needs to be addressed and is not specific to a technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Benchmark

A

Contains security recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baseline

A

Implementation of benchmark on individual service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Configuration Management

A

Ensures that systems are configured similarly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Change Management

A

Policy Outlining the procedures for processing changes helps reduce risks associated with changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardening

A

Is a practice of reducing a systems attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unified Endpoint Management

A

Provides management of the hardware, such as desktops, tablets, smartphones, and IOT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile Application Management

A

Allows a security team to manage application and data security, even on unmanaged devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sideloading

A

Enables directly installing an application package in .apk format on a mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rooting/Jailbreaking

A

Rooting and Jailbreaking remove the vendor restrictions on a mobile device to allow unsupported software to be installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wifi Direct

A

Wifi direct wireless network allows 2 wifi devices to connect to each other without requiring a WAP. It is a single path and therefore cannot be used for internet sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adhoc Wireless

A

Where 2 wireless devices can connect without a WAP but it is multipath and can share an internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tehering

A

GPS enabled smartphone can be attached to a laptop or mobile device to provide internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BYOD

A

Employee can bring their own device. Cost effective. AUP and Onboarding and Offboarding policies provide directions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CYOD

A

Chooses from list of approved devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

COPE

A

Company purchases the device and allows the employee to use it for personal use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bluejacking (Annoyance)

A

Pranksters push unsolicited messages to engage or annoy other nearby Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bluesnarfing (data theft)

A

Data theft using Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bluebugging (eavesdropping or hacking)

A

Creates backdoor attack before returning control of the phone to its owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Radio Frequency Identification

A

Uses radio frequency to identify electromagnetic field in a tag to track assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Near Field Communication

A

Built on RFID often used with payment systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

GPS

A

Measure distance between two points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Evil Twin

A

Malicious fake Wireless Access Points set up to appear legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Disassociation

A

Type of DOS attack attacker breaks the wireless connection between the victim device and access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Jamming

A

A DOS attack that prevents nodes from using the channel to communicate by occupying the channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CCMP

A

Created to replace WEP. Uses AES128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

WPA2

A

An encryption scheme that implemented the CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Simultaneous Authentication of Equals (SAE)

A

Used with WPA3. Protects against brute force. Uses a Diffie Hellman handshake called dragon fly. Immune to offline attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

WPA3

A

Uses GCMP-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

WPA3 Personal

A

Uses SAE. Users can use passwords that are easier to remember

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

WPA3 Enterprise

A

Supports 256 bit AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

AAA Protocols

A

Radius and TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Wifi Protected Setup (WPS)

A

Password is stored locally so could be brute forced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

IEEE802.1x

A

Authentication Protocol. Transparent to users because it uses certificate authentication. Can be used in conjunction with a Radius server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Radius Federation

A

Enables members of one organisation to authenticate to another with their normal credentials - Trust is across multiple RADIUS servers

36
Q

EAP (Extensible authentication protocol)

A

Authentication Framework allows for new authentication technologies to be compatible with existing wireless or point to point connections

37
Q

PEAP (Protected Extensible Authentication protocol)

A

Encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption

38
Q

LEAP (Lightweight)

A

CISCO proprietary alternative to WPA and TKIP

39
Q

Input Validation

A

Ensures buffer overflow, integer overflow and SQL injection attacks cannot be launched. Only accepts data in the correct format within a range of minimum and maximum values

40
Q

Secure Cookies

A

Used by web browser and contain information about your session. Can be stolen by attackers to carry out a session hijacking attack

41
Q

HTTP headers

A

Attacker can carry out XSS which is mainly delivered through HTTP response headers

42
Q

Code Signing

A

Uses a certificate to digitally sign scripts and executables

43
Q

Static Code Analysis

A

Code is not executed locally. Source code is run inside the tool. Requires access to source code

44
Q

Dynamic Code Analysis

A

Code is executed and technique is call fuzzing. Outside in. Does not require code access

45
Q

Fuzzing

A

Random information is input into an application

46
Q

WAF

A

Protect web applications by filtering and monitoring HTTP/HTTP traffic between a web application and the internet

47
Q

Next Generation Firewalls

A

Deep packet inspection firewall that moves beyond port/protocol inspection. Adds intrusion prevention, brings intelligence feeds

48
Q

Sandboxing

A

Application is installed in a virtual machine environment isolated from network

49
Q

Darkweb

A

Requires specialised software to able to access these private

50
Q

Trusted Automated exchange of Intelligence Information (TAXI)

A

How Real time cyber threat information can be shared via services and message exchanges

51
Q

Structured Threat Information Expression (STIX)

A

Defines a common language for expressing cyber threat information

52
Q

Known Environment

A

Substantial/ Full Information - White Box test

53
Q

Unknown Environment

A

Completely Blind - Black Box Test

54
Q

Partially Know Environment

A

Gray baox test - Some information is known

55
Q

Active Reconnaissance

A

Interacts directly with the target in some way

56
Q

Footprinting

A

Ethical hacking technique used to gather as much data as possible

57
Q

Passive Reconnaissance

A

Not integrating with the target

58
Q

Red Team (Offense)

A

Emulating the tools and techniques of likely attackers

59
Q

Blue Team (Defence)

A

Defences against both real attackers and Red team

60
Q

Purple Team

A

Process Improvement - Exist to ensure and maximize the effectiveness of Red and Blue teams

61
Q

Bug Bounty

A

Monetary Reward given to Ethical Hackers

62
Q

SCAP (Security Content Automation Protocol)

A

Is a set of open standards that facilitates the automated management of vulnerabilities and security policy compliance. Automation, Standardisation, Improved Accuracy, Compliance

63
Q

SIEM

A

Security Information Event Management

64
Q

SOAR - Security Orchestration Automation and Response

A

Centralised alert and response automation with threat specific runbooks

65
Q

User Entity Behaviour Analysis (UEBA)

A

Based on interaction of a user that focuses on their identity and the data that they would normally access

66
Q

Heuristic Analysis

A

Analyse files for suspicious characteristics even if they haven’t been encountered before

67
Q

SNMP - Simple Network Management Protocol

A

Monitors and manages network devices such as routers or switches. Can modify device configuration or report status to a management system. Agents installed on devices send info to an SNMP manager through notifications known as SNMP Traps . SNMP3 encrypts credentials

68
Q

Netflow

A

A feature available on many routers and switches that can collect IP traffic statistics and send the to Netflow collector

69
Q

Firewall

A

Controls incoming and outgoing network traffic

70
Q

Access Control List

A

Collection of firewall rules that define what traffic is allowed or denied

71
Q

Transmission Control Protocol (TCP)

A

Layer 4 of OSI model - Reliable connection for web browsing, file transfer

72
Q

User Datagram Protocol (UDP)

A

Connectionless protocol used for online gaming, streaming services

73
Q

Internet Control Message Protocol (ICMP)

A

Used for network. e.g ping

74
Q

Screened Subnet

A

Boundary layer between Internet and trusted network, Perimeter and DMZ

75
Q

Group Policy

A

Provides policy based control of windows systems and domain settings through Group Policy Objects (GPO)

76
Q

Authentication Protocol

A

Mechanism for authentication only

77
Q

Encapsulating Security Payload (ESP)

A

Provides data confidentiality, Data Integrity, data origin authentication, and replay protection

78
Q

IPSEC Mode - Transport Mode

A

Outer Header are used to determine the IPsec Policy that will be applied to the packet. It is good for ESP host-to-host traffic

79
Q

IPSEC Mode- Tunnel Mode

A

2 IP headers are sent

80
Q

DKIM (Domain key Identified Mail)

A

Acts like a digital signature for email. DKIM verifies message

81
Q

Sender Policy Framework (SPF)

A

List of authorised mail servers allowed to send emails on behalf of your domain. Acts like a whitelist. SPF verifies Sender

82
Q

DMARC

A

Combination of DKIM and SPF . Tells receiving mail servers what to do with emails. DMARC has 3 enforcement policies Monitor, Quarantine and Reject. DMARC leverages the information from SPF and DKIM to determine how to handle emails

83
Q

Email Gateway

A

Acts as a security checkpoint for all incoming and ongoing emails

84
Q

File Integrity Monitoring

A

Safeguards critical files and system configuration from unauthorised modification

85
Q

Network Access Control (NAC)

A
86
Q

XDR (Extended detection response)

A

Provides visibility into endpoints, cloud infrastructure, mobile devices, apps

87
Q

Provisioning

A