Exam 1 Flashcards

1
Q

Process of Auditing A Network or Application for Known Exploits

A

Vulnerability Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Control Designed to Physically or Logically restrict unauthorized access

A

Preventative Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Method of Assessing the Security of Systems available to an insider

A

Credentialed Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preventing an incident from spreading to other areas

A

Containment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The art of making a message difficult to understand

A

Ohdufucation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The only truly unbreakable encryption mechanism

A

One-Time Pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Document that shows a red team has obtained permission to perform a penetration test

A

Personal Letter of authorization - Get out of jail free card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Property that an encryption key should not be derivable from the ciphertext

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Control Designed to discourage an attacker from attempting an attack

A

Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Action taken to reduce the likelihood of a threat occuring

A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Completely removing the cause of an incident

A

eradication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Process of returning to normal operations following and incident

A

Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security principle that states data should only be modified by authorized individuals

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control designed to identify and record any attempted intrusions

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Property that predictable features of the plaintext should not be evident in the ciphertext

A

Difusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Limits established for security assessments

A

Rules of engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Goal of ensuring that someone cannot deny sending or creating certain data

A

Non Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security tool used to lure attackers away from actual network systems

A

Honey Pot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Documents that detail requirements for protecting technology and information assets

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Member of an incident response team who initially takes charge

A

First Responder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Method of Isolating a particular system or network for analysis following an incident

A

Quarantine - Sandboxing

22
Q

Obtaining access to an it manager’s credentials after compromising another employee

A

Escalation of Privelages

23
Q

Control that restores the function of the system through some other means

A

compensating

24
Q

Implementing security controls at various levels

A

Defense in Depth or Layered Security

25
Q

Control responds to and fixes an incident any may also prevent its recurrence

A

Corrective Control

26
Q

Specific method for establishing a shared secret across an insecure channel (a method of securely exchanging cryptographic keys over a public channel)

A

Diffle-Hellman Merkle

27
Q

Tactic to obtain someone’s credentials through observations

A

Shoulder Surfing

28
Q

Obtaining information from publicly available sources

A

Opensource Intelligence

29
Q

A form of malicious code that appears to perform one service, but also hides another purpose

A

Trojan Horse

30
Q

Intercepting and logging traffic that passes over a network

A

Packet Sniffing

31
Q

Malicious code that enables administrator-level access to a computer or network

A

RootKits

32
Q

A hidden method used to gain access to a computer system; Sometimes used by software developers

A

Backdoors

33
Q

Failing to shred documents leaves them vulnerable to this type of attack

A

Dumpster diving

34
Q

Common motivations and intents can be used to group attacker into these

A

Threat Actors

35
Q

Path or tool used to exploit a vulnerability

A

Threat Vector

36
Q

Used by attacker to discover unprotected wireless networks

A

War Driving

37
Q

Error in establishing or maintaining a security control

A

Misconfiguration

38
Q

Method of entering a secured area without authorization

A

Tailgating - Piggy Backing

39
Q

Hactivists are known for employing this type of attack

A

Denial of Service

40
Q

Replaying and spoofing packets would be classified as this

A

Injection

41
Q

A form of malicious code that is triggered by a specific event or condition

A

Logic Bomb

42
Q

Technique used to determine what is running on a particular system

A

Service Discovery or Fingerprinting

43
Q

Technique used to convince Burger King workers to break the windows of the restaurant

A

Intimidation

44
Q

Utility to show network information, such as active connection and routing tables

A

Netstat

45
Q

Claiming someone has given you permission

A

Authority

46
Q

Most challenging type of Threat Actor

A

Malicious Insider

47
Q

An arbitrary 24-bit number used along with a secret key for data wep encryption

A

Initialization Vector

48
Q

Malware capable of stealing typed credentials

A

Keylogger

49
Q

Attacker’s ability to obtain, maintain, and diversify access

A

Advanced persistent threat

50
Q

Specific setting to listen to all nearby wireless traffic

A

Promiscuous Mode

51
Q

Research activity that involves running specific queries

A

Google Hacking