Exam Prep (DION) Flashcards

1
Q

What port does the Trivial File Transfer Protocol (TFTP) use?

A

TFTP uses port 69.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What port does the Simple Mail Transfer Protocol (SMTP) use?

A

SMTP uses port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What port does the Hypertext Transfer Protocol (HTTP) use?

A

HTTP uses port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port does the Domain Name Service (DNS) protocol use?

A

DNS uses port 53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Network Access Control (NAC) and what is its primary function?

A

Network Access Control (NAC) uses protocols to define and implement a policy for securing access to network nodes when a device initially attempts to access the network. It’s focused on controlling access to a network by enforcing security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of a Security Information and Event Management (SIEM) system?

A

A SIEM system provides real-time analysis of security alerts generated by applications and network hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does an access control list differ from NAC in managing network access?

A

An access control list defines what ports, protocols, or IP addresses can be used, but unlike NAC, it cannot distinguish between different users or device types accessing the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is MAC filtering insufficient compared to NAC?

A

While MAC filtering can allow or deny network access, it cannot control which network resources are accessible from a single ethernet port, unlike NAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does dual control differ from separation of duties?

A

Dual control requires two or more people to perform a critical action together, simultaneously. It’s often used in high-security situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the concept of separation of duties in an organization?

A

Separation of duties is a security concept where more than one person is required to complete a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of mandatory vacation policies in an organization?

A

Mandatory vacation policies require employees to take time away from their jobs. This practice helps in detecting fraud or malicious activities that might be easier to spot in the absence of the employee who is on leave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Community Cloud in the context of cloud computing?

A

A Community Cloud is a form of cloud computing where the cloud infrastructure is shared among different organizations that belong to the same community or have similar computing concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the security vulnerabilities of Telnet that make it insecure?

A

Telnet is considered insecure because it transmits all data in plain text, including sensitive information such as usernames, passwords, commands, and data files. This lack of encryption makes it vulnerable to eavesdropping and interception, as unauthorized parties can easily access unencrypted data transmitted over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of traceroute/tracert commands?

A

Traceroute and tracert are diagnostic tools used to display packet routes and measure delays in IP networks. Traceroute uses ICMP, not TCP, for its analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Broadcast ping and its limitation?

A

Broadcast ping sends pings to a subnet’s broadcast IP. Its limitation is that if a regular ping fails, broadcast ping will also be ineffective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Ptunnel?

A

Ptunnel is an application that tunnels TCP connections via ICMP echo requests and replies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why are authenticated scans important in internal network assessments?

A

Authenticated scans accurately assess vulnerabilities due to deeper access, crucial in uniform enterprise networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why are uncredentialed scans less effective for vulnerability detection?

A

Uncredentialed scans lack deep system access, missing many vulnerabilities due to limited permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a limitation of the Lockheed Martin cyber kill chain model?

A

The Lockheed Martin model assumes a unidirectional attack flow, overlooking the possibility of an adversary retreating during an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do MITRE, Diamond, and AlienVault models differ from the Lockheed Martin model?

A

MITRE and Diamond offer more dynamic systems, accommodating a broader range of adversary behaviors. AlienVault was designed to overcome the rigidity of the Lockheed Martin model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why is patching not effective against zero-day threats?

A

Zero-day threats exploit unknown flaws, with no available patches at the time of discovery, making traditional patching ineffective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What strategies can protect against zero-day attacks?

A

To mitigate zero-day attacks, use network segmentation, application whitelisting, and threat intelligence for enhanced defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why is patching not effective against zero-day threats?

A

Zero-day threats exploit unknown flaws, with no available patches at the time of discovery, making traditional patching ineffective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What strategies can protect against zero-day attacks?

A

To mitigate zero-day attacks, use network segmentation, application whitelisting, and threat intelligence for enhanced defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How can you determine if SSH is operating from nmap scan results?

A

Check if port 22 is open. SSH operates over port 22, so its absence in open ports indicates SSH is not active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What ports indicate the operation of web servers?

A

Web servers use port 80 for HTTP and 443 for HTTPS. Their presence in nmap results signifies active web services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which ports are used by database servers and what do they indicate?

A

Port 1433 is used by Microsoft SQL and 3306 by MySQL. Their open status in nmap results points to active database services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How to identify if Remote Desktop Protocol is in use from nmap results?

A

Check for port 3389. If it’s open, it indicates that Remote Desktop Protocol is being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the function of a network tap and how does it operate?

A

Network taps capture a copy of network traffic for analysis, offering passive monitoring without affecting the traffic flow.

29
Q

How does active monitoring differ from using network taps?

A

Active monitoring, unlike network taps, involves scanning systems or analyzing router logs and SNMP data, directly interacting with network devices.

30
Q

What should you understand from a Snort IDS rule’s flow condition and its implications?

A

The flow condition “to_client, established” means the rule analyzes only inbound traffic for already established connections. The alert triggers if an inbound TCP packet meets all listed conditions.

31
Q

What does the rule header of a Snort IDS rule indicate about the type of packets to be alerted?

A

The rule header specifies the packet type to be monitored. In this case, it’s set to alert only on TCP packets.

32
Q

What is a directory traversal attack and how is it executed?

A

A directory traversal attack accesses files outside the webroot folder by using “../” sequences or absolute paths, potentially reaching critical system files.

33
Q

What is a buffer overflow exploit?

A

A buffer overflow occurs when data exceeds a buffer’s boundary, overwriting adjacent memory, potentially leading to system compromise.

34
Q

What is XML Injection?

A

XML Injection manipulates or compromises the logic of an XML application by injecting malicious code into its structure.

35
Q

What is SQL Injection?

A

SQL Injection involves placing malicious code in SQL statements through web page input, exploiting database vulnerabilities.

35
Q

What are the key components of endpoint security?

A

Endpoint security typically includes host-based firewalls, host-based intrusion protection systems (HIPS), and anti-virus software.

36
Q

Why is a VPN not considered an endpoint security tool?

A

A VPN is categorized as a network security tool rather than an endpoint security tool, as its primary function relates to securing network connections.

37
Q

What risks are associated with unauthorized access to devices?

A

Unauthorized access, either through unintended connections or stolen devices, can lead to exposure of sensitive data not meant for external viewing.

38
Q

What should every firm have in place for data protection and handling leaks?

A

Firms should implement data encryption policies and have protocols for managing data leaks to protect sensitive information.

39
Q

What is threat hunting in cybersecurity?

A

Threat hunting involves proactively searching for evidence of adversarial tactics, techniques, and procedures (TTPs) within a network or system, based on threat research and modeling.

40
Q

What does penetration testing entail?

A

Penetration testing simulates an attack using active tools to evaluate security, verify threats, test and bypass controls, and exploit system vulnerabilities.

41
Q

What is incident response in the context of cybersecurity?

A

Incident response is an organized approach to manage the aftermath of a security breach, aiming to limit damage and reduce recovery time and costs.

42
Q

What is Information Assurance (IA)?

A

Information Assurance (IA) is managing risks related to information use, processing, storage, and transmission, ensuring the integrity and security of data and systems.

43
Q

What is the Time-based One-time Password Algorithm (TOTP) and how does it work?

A

TOTP is an algorithm that generates a one-time password using a shared secret combined with a timestamp-derived value, ensuring time-limited token validity.

44
Q

How does TOTP improve upon the HOTP algorithm?

A

Unlike HOTP, TOTP tokens automatically expire after a short period (e.g., 60 seconds), reducing the risk of future token decryption by attackers.

45
Q

How is the Annual Loss Expectancy (ALE) determined?

A

ALE is the product of SLE and the Annual Rate of Occurrence (ARO). With an SLE of $750 and an ARO of 10, ALE = $750 * 10 = $7,500.

46
Q

How do you calculate the Single Loss Expectancy (SLE)?

A

SLE is calculated as Exposure Factor (EF) multiplied by Asset Value (AV). For an EF of 5% and an AV of $15,000, SLE = 0.05 * $15,000 = $750.

47
Q

What is Pretty Good Privacy (PGP) and its primary use?

A

PGP is an encryption program providing cryptographic privacy and authentication, mainly used for securing emails, texts, files, and disk partitions.

48
Q

How does PGP’s cryptographic approach differ from AES, RC4, and 3DES?

A

PGP is a public-key (asymmetric) cryptosystem, unlike AES, RC4, and 3DES, which are symmetric algorithms relying on shared secret keys.

49
Q

How do you prevent unauthorized access to a service in a specific scenario?

A

Block port 3389 on the host 71.168.10.45 to deny access to the Remote Desktop Protocol service from any workstation, preventing unauthorized connections.

50
Q

What is secure boot and its primary function in BIOS protection?

A

Secure boot, a UEFI security system, prevents computer hijacking by malicious OS. It verifies the OS boot loader’s digital signature against stored valid certificates.

51
Q

How does secure boot differ from other security practices?

A

Unlike other security practices active post-boot, secure boot operates at the system start-up, preventing boot sector or rootkit attacks by verifying boot loader integrity.

52
Q

What is the necessary subnet configuration for an ACL rule to enable SSH access to servers in the DMZ?

A

Use a /24 subnet for the destination network in the ACL rule to cover all three servers in the DMZ, allowing SSH access from a single source.

53
Q

What is containerization in the context of virtualization?

A

Containerization is a virtualization method where the host operating system creates isolated environments for running applications, ensuring controlled execution.

54
Q

What is a sandbox in computing?

A

A sandbox is an isolated computing environment within a host system, used to run applications securely and without affecting the host.

55
Q

What is a jumpbox and its role in network security?

A

A jumpbox is a secured server that acts as a single access point to other hosts in a network, enhancing control and monitoring of access.

56
Q

What is a honeypot and its purpose in cybersecurity?

A

A honeypot is a decoy host designed to attract attackers, diverting them from real network components and identifying attack methods and security weaknesses.

57
Q

What port does the Remote Desktop Protocol (RDP) use?

A

RDP operates over port 3389.

58
Q

What port is used by the Layer 2 Tunneling Protocol (L2TP)?

A

L2TP operates over port 1701.

59
Q

Which port does the Lightweight Directory Access Protocol (LDAP) use?

A

LDAP operates over port 389.

60
Q

What port is associated with Kerberos?

A

Kerberos operates over port 88.

61
Q

What is the Federal Information Security Management Act (FISMA)?

A

FISMA is a U.S. federal law establishing a framework to protect government information and assets against threats, requiring compliance with security standards by government agencies and associated organizations.

62
Q

What does the Health Insurance Portability and Accountability Act (HIPAA) entail?

A

HIPAA is a U.S. law providing privacy standards to protect patients’ medical records and health information handled by health plans, doctors, and healthcare providers.

63
Q

What is the Children’s Online Privacy Protection Act (COPPA)?

A

COPPA is a U.S. law requiring websites and online services targeting children under 13, or collecting data from them, to adhere to specific privacy standards.

64
Q

What is the purpose of the Sarbanes–Oxley Act (SOX)?

A

SOX is a U.S. law setting requirements for U.S. public company boards, management, and public accounting firms, focusing on corporate governance and financial practices.

65
Q

Why is the single quote character (‘) significant in SQL?

A

In SQL, single quotes delimit strings. Unescaped single quotes in an application can be exploited to inject additional SQL code, a technique used in SQL injection attacks.

66
Q

What is the role of a Relying Party (RP) in a federation?

A

Relying Parties (RPs) provide services to federation members, relying on information provided by Identity Providers (IdPs) about user identities.

67
Q

What is an Identity Provider (IdP) and its function?

A

An IdP provides user identities, asserts identity information, and releases identity holder data within a federation.

68
Q

What is Single Sign-On (SSO) and how does it work?

A

SSO is an authentication scheme that allows users to log in with a single ID and password across multiple independent software systems in a federation.