Fiankl Flashcards
What is the CIA triad?
Confidentiality (prevent unauthroized access to information or systems)
Integrity (prevent unauthroized modification of information or systems)
Availability (ensure use of information and systems is possible)
What is the DAD triad?
Disclosure (gain unauthorized access)
Alteration (make unauthorized changes)
Denial (prevent legit use of systems and info)
What are the four stages of the CompTIA Penetration
Test?
Planning and
Scoping
Information
Gathering and
Vulnerability
Scanning
Attacking and
Exploiting
Reporting and
Communicating
Results
What are the steps in The Cyber Kill Chain?
Reconnaissance.
(
Weaponization.
(
Delivery.
(
Exploitation.
(
Installation.
(
Command and control.
(
Actions on Objectives.
(
What is Reconnaissance in the cyber kill chain?
(Attackers gather open source intelligence and conduct initial scans of target environment
What is Weaponization in the cyber kill chain?
Attackers develop a specific
attack tool designed to exploit the vulnerabilities identified during reconnaissance.
What is Delivery in the cyber kill chain?
Attackers next must deliver that malware to the target. (Network vuln, social enginnering, infected USB, sending as email attachment,
What is Exploitation in the cyber kill chain?
The malware gains access to the targeted system. Victim opens a malicious file or when the attacker exploits a vulnerability over the network or otherwise gains a foothold on the target
What is Installation in the cyber kill chain?
The attacker uses the
initial access provided by the malware to establish permanent, or persistent, access to the
target system. (Making a backdoor
What is Command and Control in the cyber kill chain?
After getting permanent access the attacker may use a remote shell or other means to control the system.
They can control it manually or may connect an automated command-and-control (C2C) network that provides it with instructions.
Tom is running a penetration test in a web application and discovers a flaw that allows
him to shut down the web server remotely.
What goal of penetration testing has Tom most
directly achieved?
A. Disclosure
B. Integrity
C. Alteration
D. Denial
D. Denial
What is Actions on Objectives in the cyber kill chain?
Attacker uses the system to advance the original objectives of their attack. (theft, use of resources, mine crypto, modification or deletion of information.
Brian ran a penetration test against a school’s grading system and discovered a flaw that
would allow students to alter their grades by exploiting a SQL injection vulnerability.
What
type of control should he recommend to the school’s cybersecurity team to prevent students
from engaging in this type of activity?
A. Confidentiality
B. Integrity
C. Alteration
D. Availability
B. Integrity
Assuming no significant changes in an organization’s cardholder data environment, how
often does PCI DSS require that a merchant accepting credit cards conduct penetration testing?
A. Monthly
B. Semiannually
C. Annually
D. Biannually
C. Annually
(or after any significant change in the cardholder data environment)
Which one of the following is not a benefit of using an internal penetration testing team?
A. Contextual knowledge
B. Cost
C. Subject matter expertise
D. Independence
D. Independence
Edward Snowden gathered a massive quantity of sensitive information from the National
Security Agency and released it to the media without permission.
What type of attack
did he wage?
A. Disclosure
B. Denial
C. Alteration
D. Availability
A. Disclosure
Beth recently conducted a phishing attack against a penetration testing target in an attempt
to gather credentials that she might use in later attacks. What stage of the penetration testing
process is Beth in?
Attacking and Exploiting (she is conducting an
active social engineering attack.
Rich recently got into trouble with a client for using an attack tool during a penetration
test that caused a system outage. During what stage of the penetration testing process
should Rich and his clients have agreed on the tools and techniques that he would use during the test?
A. Planning and Scoping
B. Information Gathering and Vulnerability Scanning
C. Attacking and Exploiting
D. Reporting and Communication Results
A. Planning and Scoping
Which one of the following steps of the Cyber Kill Chain does not map to the Attacking and
Exploiting stage of the penetration testing process?
A. Weaponization
B. Reconnaissance
C. Installation
D. Actions on Objective
B. Reconnaissance
Which one of the following security assessment tools is not commonly used during the
Information Gathering and Vulnerability Scanning phase of a penetration test?
A. Nmap
B. Nessus
C. Metasploit
D. Nslookup
C. Metasploit
(exploitation framework , suited for Attacking and Exploiting phase
Which one of the following is not an open source intelligence gathering tool?
A. WHOIS
B. Nslookup
C. Nessus
D. FOCA
C. Nessus (commercial vulnerability scanner)
FOCA (harvests information from files)
During what phase of the Cyber Kill Chain does an attacker steal information, use computing resources, or alter information without permission?
C. Actions on Objectives
What does pwd do in Linux?
Shows the current directory you are working in
What vulnerability scanner is specifically designed to test the security
of web applications against a wide variety of attacks?
Nikto
Grace is investigating a security incident where the attackers left USB drives containing
infected files in the parking lot of an office building. What stage in the Cyber Kill Chain
describes this action?
C. Delivery
What do these mean and what do they translate to in numbers
- Rwx-rw-r 2. Rw–wx-r–
- Rwx-rw-r
User can read write and execute
Group can read and write
Others can only read
761
- Rw–wx-r–
User can read and write
Group can write and execute
USer can only read
634
r = 4
w =2
x =1
Which one of the following tools is an exploitation framework commonly used by penetration testers?
A. Metasploit
B. Wireshark
C. Aircrack-ng
D. SET
A. Metasploit
How would you run a network scan on the 192.168.68.1 IP?
nmap 192.168.68.1 Network
What does ls and ls -l do in Linux?
Lists the contents of the folder you are working in. -l shows all files in those directories. and their permissions