Final Baby Flashcards
Which of the Critical Security Controls specifies conducting security awareness training for a
company’s employees?
CIS Control 17 Incident Response
Which of these sub-controls do you think would be the “easiest” for an IT organization to
implement? Why?
CIS Control 4 would be the easiest to implement. Controlled Use of
Administrative Privileges comes down to changing passwords when inserting something new and making
sure that only people with administrative accounts use certain workstations and have enhanced privileges.
Multifactor Authentication and logging Administrative activity are also a factor.
Which of the Critical Security Controls is used when a potential security incident occurs within a
company? Why?
CIS Control 19 is used when a security incident occurs.
Incident Response ensures that an incident response team is prepared to handle an incident and detail it to the proper authorities.
Which of the Critical Security Controls would application developers be most interested in? Why?
CIS Control 18 would be the most interesting to application developers.
Application Software Security details how to make an application secure using firewalls, analysis tools, and algorithms.
The NSA ANT Catalog is a list of technological solutions available to NSA team members.
What does ANT stand for?
Advanced Network Technology
What is the name of the NSA “elite hacking force”?
TAO
What is the name given to the NSA hacking group by outside malware companies
Equation Group
What is the name of the exploit created by TAO which can be used to take full control of a
Microsoft Windows system over SMB?
EternalBlue
Who does Jack Rhysider interview for the podcast? What is the name of the interviewee’s
company?
Jake Williams
Rendition InfoSec
What is doxing?
Posting someone’s private information on the internet, usually with malicious intent
What is name of the Foundation established by Chris as part of his work against child predators
Innocent Lives Foundation
What is the name of the Project that law enforcement asks for the public’s help in cataloging the
appearance of different hotel rooms in helping to identify the location in which child pornography
images might have been taken?
The Polaris Project
What is the world’s most popular network packet sniffer?
Wireshark
What is a packet sniffer?
A computer program that can intercept and log traffic that passes over a computer network or part of a network.
What is the command line version of Wireshark?
Wireshark -h
TCP and FTP are unencrypted protocols? T or F
T
ARP is an unencrypted protocol? T or F
F
What is penetration testing?
A cyber security professional is authorized to emulate a malicious attacker by
attempting to hack into the company and its systems.
What is the first phase of Penetration Testing?
Pre-engagement, working with the client to understand how big the job is gonna
be, understanding why they want to do this job. Give the client the best value for their money.
What is the second phase of Penetration Testing?
Engagement, performing reconnaissance and scanning the system for any vulnerabilities,
accessing the system, and figuring out what you have access to once you break in.
What is the third phase of Penetration Testing?
Post-Engagement, taking all the information from the testing and creating a finance report.
Telling the client what you did and telling them evidence of issues that were found and telling them how
to fix those issues.
The difference between an attacker and a penetration tester is that a professional penetration tester
will always have what?
A penetration tester has permission
How long is a MD5 hash in bits? Bytes?
128 bits
16 bytes
How long is a SHA256 file hash in bits? Bytes?
256 bits
32 bytes