Final Baby Flashcards

1
Q

Which of the Critical Security Controls specifies conducting security awareness training for a
company’s employees?

A

CIS Control 17 Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these sub-controls do you think would be the “easiest” for an IT organization to
implement? Why?

A

CIS Control 4 would be the easiest to implement. Controlled Use of
Administrative Privileges comes down to changing passwords when inserting something new and making
sure that only people with administrative accounts use certain workstations and have enhanced privileges.
Multifactor Authentication and logging Administrative activity are also a factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the Critical Security Controls is used when a potential security incident occurs within a
company? Why?

A

CIS Control 19 is used when a security incident occurs.
Incident Response ensures that an incident response team is prepared to handle an incident and detail it to the proper authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the Critical Security Controls would application developers be most interested in? Why?

A

CIS Control 18 would be the most interesting to application developers.
Application Software Security details how to make an application secure using firewalls, analysis tools, and algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The NSA ANT Catalog is a list of technological solutions available to NSA team members.
What does ANT stand for?

A

Advanced Network Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name of the NSA “elite hacking force”?

A

TAO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name given to the NSA hacking group by outside malware companies

A

Equation Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the name of the exploit created by TAO which can be used to take full control of a
Microsoft Windows system over SMB?

A

EternalBlue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who does Jack Rhysider interview for the podcast? What is the name of the interviewee’s
company?

A

Jake Williams
Rendition InfoSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is doxing?

A

Posting someone’s private information on the internet, usually with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is name of the Foundation established by Chris as part of his work against child predators

A

Innocent Lives Foundation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the name of the Project that law enforcement asks for the public’s help in cataloging the
appearance of different hotel rooms in helping to identify the location in which child pornography
images might have been taken?

A

The Polaris Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the world’s most popular network packet sniffer?

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a packet sniffer?

A

A computer program that can intercept and log traffic that passes over a computer network or part of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the command line version of Wireshark?

A

Wireshark -h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP and FTP are unencrypted protocols? T or F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP is an unencrypted protocol? T or F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is penetration testing?

A

A cyber security professional is authorized to emulate a malicious attacker by
attempting to hack into the company and its systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the first phase of Penetration Testing?

A

Pre-engagement, working with the client to understand how big the job is gonna
be, understanding why they want to do this job. Give the client the best value for their money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the second phase of Penetration Testing?

A

Engagement, performing reconnaissance and scanning the system for any vulnerabilities,
accessing the system, and figuring out what you have access to once you break in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the third phase of Penetration Testing?

A

Post-Engagement, taking all the information from the testing and creating a finance report.
Telling the client what you did and telling them evidence of issues that were found and telling them how
to fix those issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The difference between an attacker and a penetration tester is that a professional penetration tester
will always have what?

A

A penetration tester has permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How long is a MD5 hash in bits? Bytes?

A

128 bits
16 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How long is a SHA256 file hash in bits? Bytes?

A

256 bits
32 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Why would a member of law enforcement need to calculate the file hash for a file?
Law enforcement can calculate a hash file and then compare it to already discovered malicious content that is in their database. If anything is similar than it is illegal.
26
Why would someone else want to calculate a file hash after downloading a file?
Someone would calculate the hash of a recently downloaded file and look up what the correct hash is supposed to be. If they are different than the file is fraudulent/malicious.
27
What is OSINT?
Open-source intelligence Gathering techniques can be used by cyber security professionals and malicious parties alike to a wide variety of information about a target, whether that target is an individual or an organization.
28
What is some information dnslytics.com shows?
The domain name, administrative contact, technical contact, when the domain was activated and will expire.
29
What is the main security concern with companies running IIS 7.5 after January 14th, 2020
It will not be supported by Microsoft.
30
Shodan can do what?
Show how many hosts are on a target network.
31
What is Nmap?
It is the most popular security tool in use today. Used to scan a network and view ports, device names, and operating systems
32
Why would an attacker want to clear out an event log?
To remove evidence of any wrongdoing
33
What is a command used by a “normal” user to elevate their privileges to administrator-level access. What is the name of this command?
Windows: User Account Control Linux: Sudo
34
If a user is a system administrator for an organization, how many different user accounts (at a minimum) would they have?
An admin account and a regular account for regular work
35
In Cuckoo's Egg which software had vulnerability in it that allowed the attacker to overwrite another file on the affected system?
The Gnu program
36
What is the meaning of the title of Cliff Stoll’s book - “The Cuckoo’s Egg
A cuckoo lays its eggs in another bird’s nest like a parasite. This thing is entirely reliant on other birds being tricked. Cliff calls the hacker a Cuckoo because they laid their “egg” in the gnu and was given administrator access.
37
As explained by Chris, what is the common thread between all attackers
All attackers want to steal something, money, intellectual property, personal info, time, or reputation. Reputation can be someone’s website or social media being hacked and changed.
38
How long did the “Shellshock” vulnerability exist before it was discovered and disclosed to the general public? What system did it affect? What access did it give?
It lasted 30 years before it was discovered. Unix-based systems. Unrestricted Access
39
A cyber attack must only be as “ ______________ ” as it has to be?
Sophisticated
40
Where are the three places discussed that clear text passwords can exist?
In the user’s head In transit on the network In limited places in the operating system
41
What is the name of the tool Chris uses to dump clear text passwords from the operating system’s running memory?
Mimikatz.exe
42
What tool does Chris use to decrypt password hashes?
John the Ripper
43
How is the UEFI rootkit installed?
You get it by installing Absolute Software’s LoJack.
44
How does the UEFI rootkit work?
Instead of communicating with Absolute’s server it communicates with Fancy Bear’s. It then adds a malicious UEFI module to the firmware image, this effectively installs the rootkit to the system.
45
How can the UEFI rootkit be removed?
The only way to remove it is to flash the firmware. This basically means the user has to overwrite existing data or firmware, that is currently used on an electronic device, with different, new data
46
Which attacker group is being named as the party responsible for the UEFI rootkit?
Fancy Bear
47
If a corporate network is known to be compromised, what form of communication should employees not use?
Email
48
What is OPSEC?
OPSEC stands for Operational Security. OPSEC identifies actions, programs, or processes that could be vulnerable to a hacker on the outside. Looking at processes from an outsider view lets OPSEC teams locate issues that could have been overlooked and develop countermeasures for these problems. This helps keep sensitive data secure.
49
What are three different risks associated with ad networks
They manipulate your browser, they inject scripts, and build profiles of users and systems.
50
What is one way to block the risks associated with ad networks on the systems that you manage
Don't allow scripts to run without approval
51
For Cyber Security professionals practicing OPSEC, how should we consider browsing the Internet to ensure safety and reduce (if not eliminate) the impact of malware?
Don't allow scripts to run without approval. ⦁ Disable password manager autofill ⦁ Disable browser prefetch ⦁ Do work browsing from a VM
52
Describe attacker pivoting
Attacker’s want to get in, do what they want, then get out without leaving a trace.
53
What is "living off the land"?
Using tools and services that already exist in malicious ways. Netcat is an example, cannot be traced back to the attacker, can be used for port scanning, transferring data, honeypotting (setting up a fake service), and also redirecting network traffic.
54
Specify three different types of online accounts people would want to enable 2FA for.
Email, bank, and work
55
What are two ways in which you can overcome bias?
Understand how bias affects you, make evidence based decisions
56
What are five sources of intelligence
Humans, recovered media, breaches, third parties (financial Records), intercepted communication
57
What specific type of malware could spread with the permissions assigned to ‘Everyone’?
Worms or ransomware
58
Dictionary attack?
an attempted illegal entry to a computer system that uses a dictionary headword list to generate possible passwords.
59
What are four concerns discussed with regards to evidence handling?
Permission Volatility Pollution Chain of Custody
60
Class A Extinguisher?
puts out wood and paper
61
Class B Extinguisher?
puts out flammable liquids
62
Class C Extinguisher?
puts out electrical fires
63
Class D Extinguisher?
puts out flammable metals
64
What are steps that should be taken next to address a malicious program.
Disconnect the system from the company’s network. Completely wipe the system and re-install the operating system. Restore any lost data from a last known good backup. Determine how the executable got on the user’s system Determine what activity the malware was being used to do. Escalate to the company’s Cyber Security team.
65
What is ransomware?
Malware that prevents a user’s device from properly and fully functioning until a fee is paid.
66
What is a worm?
A malicious program that uses a computer network to replicate
67
What is a virus?
Malicious computer code that reproduces itself on the same computer.
68
What is a logic bomb?
Computer code that lies dormant until it is triggered by a specific logical event.
69
What is fileless malware?
Uses PowerShell to execute attacks. With no traces
70
What is the layering principle?
Mulitple defenses
71
What is the limiting principle?
Access is lowered
72
What is the diversity principle?
Using different vendors, people on your system
73
What is the obscurity principle?
Not revealing computer or hardware information
74
What is the simplicity principle?
Simple from the inside, complex on the outside
75
Availability is the most overlooked aspect of C-I-A in organizations today. T or F
T
76
Confidentiality
Ensures that only authorized parties can view the information
77
Integrity
Ensures that the information is correct and no unauthorized person or malicious software has altered that data
78
Authentication
Provides proof of the genuineness of the user
79
Non-repudiation
Proves that a user performed an action
80
Obfuscation
Makes something obscure or unclear.
81
What does a hash algorithm do?
A hash algorithm creates a unique “digital fingerprint” of a set of data
82
What is a symmetric algorithm?
One key is used to encrypt and decrypt the algorithm
83
Asymmetric algorithm?
Two keys are used, one to encrypt and one to decrypt
84
The RSA is a symmetric algorithm T or F
False
85
How many bits is an MD5 algorithm?
128 bits 32 characters
86
What is Hydra?
A brute force attack program.
87
In the diamond model of intrusion analysis what would the attacker be?
The adversary
88
What does Simple Network Managing Protocol (SNMP) do? Port Number?
a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks. (Port 161)
89
What is an eavesdropping attack?
When a hacker intercepts, deletes, or modifies data that is transmitted between two devices.
90
What is war driving?
The act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.
91
What port is htttps commonly on?
port 443
92
What port is smtp (Simple mail transport protocol) commonly on?
Port 25
93
What port is FTP (File transfer protocol) commonly on?
port 21
94
What is a privilege escalation attack?
An attacker can increase their privilege's to a network.
95
What is an SQL injection?
An attacker sends unfiltered commands to a database.
96
Describe the 802.11a specification? Ghz and frequency
5 GHz 54 Mbps
97
Describe the 802.11b specification?
2.4 GHz 11 Mbps
98
Describe the 802.11n specification?
2.4 & 5 GHz 600 Mbps
99
Describe the 802.11ac specification?
5 GHz 7.2 Mbps
100
Which of the following can be used to physically secure someone's laptop to prevent it from being stolen when left in an office, at home or while on the road such as in a hotel room?
Cable lock
101
Which of the following is a random string used when encrypting user passwords - for additional security which can limit the effectiveness of different password attacks?
A salt
102
In order to perform a walk through simulation of its incident response processes, or any other types of written procedures, an organization could conduct which of the following?
Tabletop exercises
103
Years after the events detailed in Cliff Stoll's The Cuckoo's Egg, Hans "Pengo" Hubner now works as ?
Pengo is now working as a professional programmer as a data processing engineer(Healthcare systems)
104
Which one of the following is considered a popular vulnerability scanner solution?
Nessus
105
Which of the following would be considered an Industrial Control System?
PLC (Programmable Logic Controller)
106
What is a technical access control?
Anything that limits users from accessing data Encryption, biometrics, firewalls
107
Which of the following best practices for access control can help reduce employee "burnout" while also being used to help identify malicious insiders?
Job Rotation
108
You run an Nmap scan of a corporate system and discover three open services running on TCP 21, TCP 80 and UDP 161. How many of these services should be scanned for vulnerabilities on a regular basis?
3
109
What is the name of the metal enclosure that can be used to completely block electromagnetic fields and protect systems from electromagnetic interferance or electormagnetic eavesdropping?
Faraday cage
110
Most cyber security experts agree that the only way for organizations to recover from a ransomware infection is to?
Reinstall software and revert to backups
111
List the six different phases of the incident handling process in correct order.
Preparation, identification, containment, eradication, recovery, lessons learned
112
Which of the following data destruction methodologies ensures that data stored on electromagnetic media is permanently and irrevocably destroyed?
Degausse
113
Which of the following protocols was designed at MIT and is used as the main network authentication protocol in Windows environments with Active Directory?
Kerberos