Final Baby Flashcards

1
Q

Which of the Critical Security Controls specifies conducting security awareness training for a
company’s employees?

A

CIS Control 17 Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these sub-controls do you think would be the “easiest” for an IT organization to
implement? Why?

A

CIS Control 4 would be the easiest to implement. Controlled Use of
Administrative Privileges comes down to changing passwords when inserting something new and making
sure that only people with administrative accounts use certain workstations and have enhanced privileges.
Multifactor Authentication and logging Administrative activity are also a factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the Critical Security Controls is used when a potential security incident occurs within a
company? Why?

A

CIS Control 19 is used when a security incident occurs.
Incident Response ensures that an incident response team is prepared to handle an incident and detail it to the proper authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the Critical Security Controls would application developers be most interested in? Why?

A

CIS Control 18 would be the most interesting to application developers.
Application Software Security details how to make an application secure using firewalls, analysis tools, and algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The NSA ANT Catalog is a list of technological solutions available to NSA team members.
What does ANT stand for?

A

Advanced Network Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name of the NSA “elite hacking force”?

A

TAO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name given to the NSA hacking group by outside malware companies

A

Equation Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the name of the exploit created by TAO which can be used to take full control of a
Microsoft Windows system over SMB?

A

EternalBlue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who does Jack Rhysider interview for the podcast? What is the name of the interviewee’s
company?

A

Jake Williams
Rendition InfoSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is doxing?

A

Posting someone’s private information on the internet, usually with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is name of the Foundation established by Chris as part of his work against child predators

A

Innocent Lives Foundation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the name of the Project that law enforcement asks for the public’s help in cataloging the
appearance of different hotel rooms in helping to identify the location in which child pornography
images might have been taken?

A

The Polaris Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the world’s most popular network packet sniffer?

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a packet sniffer?

A

A computer program that can intercept and log traffic that passes over a computer network or part of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the command line version of Wireshark?

A

Wireshark -h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP and FTP are unencrypted protocols? T or F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP is an unencrypted protocol? T or F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is penetration testing?

A

A cyber security professional is authorized to emulate a malicious attacker by
attempting to hack into the company and its systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the first phase of Penetration Testing?

A

Pre-engagement, working with the client to understand how big the job is gonna
be, understanding why they want to do this job. Give the client the best value for their money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the second phase of Penetration Testing?

A

Engagement, performing reconnaissance and scanning the system for any vulnerabilities,
accessing the system, and figuring out what you have access to once you break in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the third phase of Penetration Testing?

A

Post-Engagement, taking all the information from the testing and creating a finance report.
Telling the client what you did and telling them evidence of issues that were found and telling them how
to fix those issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The difference between an attacker and a penetration tester is that a professional penetration tester
will always have what?

A

A penetration tester has permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How long is a MD5 hash in bits? Bytes?

A

128 bits
16 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How long is a SHA256 file hash in bits? Bytes?

A

256 bits
32 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why would a member of law enforcement need to calculate the file hash for a file?

A

Law enforcement can calculate a hash file and then compare it to already discovered malicious
content that is in their database. If anything is similar than it is illegal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Why would someone else want to calculate a file hash after downloading a file?

A

Someone would calculate the hash of a recently downloaded file and look up what the correct
hash is supposed to be. If they are different than the file is fraudulent/malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is OSINT?

A

Open-source intelligence

Gathering techniques can be used by cyber security
professionals and malicious parties alike to a wide variety of information about a target, whether
that target is an individual or an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is some information dnslytics.com shows?

A

The domain name, administrative contact,
technical contact, when the domain was activated and will expire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the main security concern with companies running IIS 7.5 after January 14th, 2020

A

It will not be supported by Microsoft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Shodan can do what?

A

Show how many hosts are on a target network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Nmap?

A

It is the most popular security tool in use today.

Used to scan a network and view ports, device names, and operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Why would an attacker want to clear out an event log?

A

To remove evidence of any wrongdoing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a command used by a “normal” user to elevate
their privileges to administrator-level access. What is the name of this command?

A

Windows: User Account Control
Linux: Sudo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

If a user is a system administrator for an organization, how many different user accounts (at a
minimum) would they have?

A

An admin account and a regular account for regular work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In Cuckoo’s Egg which software had vulnerability in it that allowed the attacker to overwrite another file on the affected system?

A

The Gnu program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the meaning of the title of Cliff Stoll’s book - “The Cuckoo’s Egg

A

A cuckoo lays its eggs in another bird’s nest like a parasite. This thing is entirely reliant on other birds being tricked.
Cliff calls the hacker a Cuckoo because they laid their “egg” in the gnu and was given administrator
access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

As explained by Chris, what is the common thread between all attackers

A

All attackers want to steal something, money, intellectual property, personal info, time, or reputation. Reputation can be someone’s website or social media being hacked and changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How long did the “Shellshock” vulnerability exist before it was discovered and disclosed to the general public? What system did it affect? What access did it give?

A

It lasted 30 years before it was discovered.
Unix-based systems.
Unrestricted Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A cyber attack must only be as “
______________
” as it has to be?

A

Sophisticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Where are the three places discussed that clear text passwords can exist?

A

In the user’s head
In transit on the network
In limited places in the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the name of the tool Chris uses to dump clear text passwords from the operating system’s
running memory?

A

Mimikatz.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What tool does Chris use to decrypt password hashes?

A

John the Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How is the UEFI rootkit installed?

A

You get it by installing Absolute Software’s
LoJack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How does the UEFI rootkit work?

A

Instead of communicating with Absolute’s server it
communicates with Fancy Bear’s. It then adds a malicious UEFI module to the firmware image, this
effectively installs the rootkit to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How can the UEFI rootkit be removed?

A

The only way to remove it is to flash the
firmware. This basically means the user has to overwrite existing data or firmware, that is currently used
on an electronic device, with different, new data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which attacker group is being named as the party responsible for the UEFI rootkit?

A

Fancy Bear

47
Q

If a corporate network is known to be compromised, what form of communication should employees
not use?

A

Email

48
Q

What is OPSEC?

A

OPSEC stands for Operational Security.

OPSEC identifies actions, programs, or processes that could be vulnerable to a hacker on the
outside. Looking at processes from an outsider view lets OPSEC teams locate issues that could have been
overlooked and develop countermeasures for these problems. This helps keep sensitive data secure.

49
Q

What are three different risks associated with ad networks

A

They manipulate your browser, they inject
scripts, and build profiles of users and systems.

50
Q

What is one way to block the risks associated with ad networks on the systems that you manage

A

Don’t allow scripts to run without approval

51
Q

For Cyber Security professionals practicing OPSEC, how should we consider browsing the Internet to
ensure safety and reduce (if not eliminate) the impact of malware?

A

Don’t allow scripts to run without approval.
⦁ Disable password manager autofill
⦁ Disable browser prefetch
⦁ Do work browsing from a VM

52
Q

Describe attacker pivoting

A

Attacker’s want to get in, do what they want, then get out
without leaving a trace.

53
Q

What is “living off the land”?

A

Using tools and services that already exist in malicious ways. Netcat is an example, cannot be
traced back to the attacker, can be used for port scanning, transferring data, honeypotting (setting up a
fake service), and also redirecting network traffic.

54
Q

Specify three different types of online accounts people would want to enable 2FA for.

A

Email, bank, and work

55
Q

What are two ways in which you can overcome bias?

A

Understand how bias affects you, make evidence based decisions

56
Q

What are five sources of intelligence

A

Humans, recovered media, breaches, third parties (financial Records), intercepted communication

57
Q

What specific type of malware could spread with the permissions assigned to ‘Everyone’?

A

Worms or ransomware

58
Q

Dictionary attack?

A

an attempted illegal entry to a computer system that uses a dictionary headword list to generate possible passwords.

59
Q

What are four concerns discussed with regards to evidence handling?

A

Permission
Volatility
Pollution
Chain of Custody

60
Q

Class A Extinguisher?

A

puts out wood and paper

61
Q

Class B Extinguisher?

A

puts out flammable liquids

62
Q

Class C Extinguisher?

A

puts out electrical fires

63
Q

Class D Extinguisher?

A

puts out flammable metals

64
Q

What are steps that should be taken next to address a malicious program.

A

Disconnect the system from the company’s network.
Completely wipe the system and re-install the operating system.
Restore any lost data from a last known good backup.
Determine how the executable got on the user’s system
Determine what activity the malware was being used to do.
Escalate to the company’s Cyber Security team.

65
Q

What is ransomware?

A

Malware that prevents a user’s device from properly and fully functioning until a fee is paid.

66
Q

What is a worm?

A

A malicious program that uses a computer network to replicate

67
Q

What is a virus?

A

Malicious computer code that reproduces itself on the same computer.

68
Q

What is a logic bomb?

A

Computer code that lies dormant until it is triggered by a specific logical event.

69
Q

What is fileless malware?

A

Uses PowerShell to execute attacks. With no traces

70
Q

What is the layering principle?

A

Mulitple defenses

71
Q

What is the limiting principle?

A

Access is lowered

72
Q

What is the diversity principle?

A

Using different vendors, people on your system

73
Q

What is the obscurity principle?

A

Not revealing computer or hardware information

74
Q

What is the simplicity principle?

A

Simple from the inside, complex on the outside

75
Q

Availability is the most overlooked aspect of C-I-A in organizations today. T or F

A

T

76
Q

Confidentiality

A

Ensures that only authorized parties can view the information

77
Q

Integrity

A

Ensures that the information is correct and no unauthorized person or malicious software has altered that data

78
Q

Authentication

A

Provides proof of the genuineness of the user

79
Q

Non-repudiation

A

Proves that a user performed an action

80
Q

Obfuscation

A

Makes something obscure or unclear.

81
Q

What does a hash algorithm do?

A

A hash algorithm creates a unique “digital fingerprint” of a set of data

82
Q

What is a symmetric algorithm?

A

One key is used to encrypt and decrypt the algorithm

83
Q

Asymmetric algorithm?

A

Two keys are used, one to encrypt and one to decrypt

84
Q

The RSA is a symmetric algorithm T or F

A

False

85
Q

How many bits is an MD5 algorithm?

A

128 bits
32 characters

86
Q

What is Hydra?

A

A brute force attack program.

87
Q

In the diamond model of intrusion analysis what would the attacker be?

A

The adversary

88
Q

What does Simple Network Managing Protocol (SNMP) do? Port Number?

A

a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks. (Port 161)

89
Q

What is an eavesdropping attack?

A

When a hacker intercepts, deletes, or modifies data that is transmitted between two devices.

90
Q

What is war driving?

A

The act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.

91
Q

What port is htttps commonly on?

A

port 443

92
Q

What port is smtp (Simple mail transport protocol) commonly on?

A

Port 25

93
Q

What port is FTP (File transfer protocol) commonly on?

A

port 21

94
Q

What is a privilege escalation attack?

A

An attacker can increase their privilege’s to a network.

95
Q

What is an SQL injection?

A

An attacker sends unfiltered commands to a database.

96
Q

Describe the 802.11a specification? Ghz and frequency

A

5 GHz
54 Mbps

97
Q

Describe the 802.11b specification?

A

2.4 GHz
11 Mbps

98
Q

Describe the 802.11n specification?

A

2.4 & 5 GHz
600 Mbps

99
Q

Describe the 802.11ac specification?

A

5 GHz
7.2 Mbps

100
Q

Which of the following can be used to physically secure someone’s laptop to prevent it from being stolen when left in an office, at home or while on the road such as in a hotel room?

A

Cable lock

101
Q

Which of the following is a random string used when encrypting user passwords - for additional security which can limit the effectiveness of different password attacks?

A

A salt

102
Q

In order to perform a walk through simulation of its incident response processes, or any other types of written procedures, an organization could conduct which of the following?

A

Tabletop exercises

103
Q

Years after the events detailed in Cliff Stoll’s The Cuckoo’s Egg, Hans “Pengo” Hubner now works as ?

A

Pengo is now working as a professional programmer as a data processing engineer(Healthcare systems)

104
Q

Which one of the following is considered a popular vulnerability scanner solution?

A

Nessus

105
Q

Which of the following would be considered an Industrial Control System?

A

PLC (Programmable Logic Controller)

106
Q

What is a technical access control?

A

Anything that limits users from accessing data
Encryption, biometrics, firewalls

107
Q

Which of the following best practices for access control can help reduce employee “burnout” while also being used to help identify malicious insiders?

A

Job Rotation

108
Q

You run an Nmap scan of a corporate system and discover three open services running on TCP 21, TCP 80 and UDP 161. How many of these services should be scanned for vulnerabilities on a regular basis?

A

3

109
Q

What is the name of the metal enclosure that can be used to completely block electromagnetic fields and protect systems from electromagnetic interferance or electormagnetic eavesdropping?

A

Faraday cage

110
Q

Most cyber security experts agree that the only way for organizations to recover from a ransomware infection is to?

A

Reinstall software and revert to backups

111
Q

List the six different phases of the incident handling process in correct order.

A

Preparation, identification, containment, eradication, recovery, lessons learned

112
Q

Which of the following data destruction methodologies ensures that data stored on electromagnetic media is permanently and irrevocably destroyed?

A

Degausse

113
Q

Which of the following protocols was designed at MIT and is used as the main network authentication protocol in Windows environments with Active Directory?

A

Kerberos