Domain 6 set 1 Flashcards

1
Q

5 steps in an attack

A
  1. Reconnaissance
  2. Foot-printing (Mapping the Network) Nmap
  3. Fingerprinting (port scanning)
  4. Vulnerability assessment (identifying weaknesses)
  5. The Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Red Team?

A

ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Blue Team

A

Defend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS is passive or active ?

A

passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS and IPS need what to view traffic

A

Port mirroring / span

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the interface need to be in what mode for a IDS

A

Promiscuous Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

use what ids type for a single system

A

Host-based IDS (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

use what ids type for a network segment

A

Network-based IDS (NDIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analysis Engine on a IDS does what?

A

Analyzes data collected by the sensor, determines if there is suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the 4 parts of an IDS

A
  1. Sensors
  2. Analysis Engine
  3. Signature Database
  4. User Interface and reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What IDS decrypt data?

A

Host-based IDS (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A sensor is sometimes called what

A

Traffic Collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the two analysis engines?

A
  1. Pattern matching

2. profile matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Anomaly / behavior is what type of analysis engines?

A

profile matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

analysis engine that needs a baseline

A

profile matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

analysis engine that detects zero day attacks

A

profile matching

17
Q

analysis engine that has alot of False positives

A

profile matching

18
Q

analysis engine that needs a subscription from a vendor

A

Pattern matching

19
Q

analysis engine detects non technical attacks?

A

profile matching

20
Q

Attacks the are for profile IDS

A
  1. Evasion (fly under the RADAR) (lots of small attacks

2. insertion attacks (against Pattern matching)

21
Q

signature-based detection systems are what type of analysis engine?

A

Pattern matching

22
Q

Pseudo Flaw?

A

loophole to entice and trap intruders in application