Final Deck Flashcards

1
Q

What are the steps in collecting forensic data?

A
  1. Secure physical and remote access to the system before it can be altered
  2. Begin eDiscovery. Place on legal hold.
  3. Classify evidence according to the order of volitility
  4. Acquire data using relevant tools
  5. Preserve the data in accountable, unalterable form
  6. Analyze collected data to determine what is relevant to the case
  7. Assemble your findings into a report
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the order of volatility?

A
  1. CPU registers and cache memory
  2. Routing tables, ARP cache, process tables, and kernel stats
  3. Other RAM contents
  4. Swap files or other temporary file systems
  5. Other data on hard drives or flash media
  6. Network logging data
  7. Firmware of physical configuration
  8. Archival media such as optical disks or printouts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This software is placed on some network appliance such as a firewall or router. It scans all outgoing data passing through that point. It can protect the entire organization, but it can’t scan something like encrypted data sent over a TLS connection, or someone copying data to an unauthorized system or storage device inside the network.

A

Network-based DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This software can protect all data which passes through the endpoint it’s installed on, such as stored files, print jobs, encrypted network connections, and data copied to USB drives. The drawbacks are that it must be installed on every endpoint that handles sensitive data and that it might be compromised by any
attack which compromises that host.

A

Endpoint DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What protocol is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol.

A

Secure Copy Protocol (SCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of injection attack is this an example of?

&(USER=john90)(&))(PASSWORD=Pwd)

A

LDAP injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of injection attack is this an example of?

SELECT * FROM Users WHERE Name =”” or “”=”” AND Pass =”” or “”=””

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of injection attack is this an example of?
db.collection.find( { $where: function() {
return (this.name == ‘a’; sleep(5000) ) } } )

A

NoSQL injection (specifically Javascript against a MongoDB database)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of injection attack is this an example of?

http://www.example.com/create_user.php?name=thomas&password=hfdj7!dn0thomas@mail.com

A

XML injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of injection attack is this an example of?
?xml version=”1.0” encoding=”UTF-8”?
!DOCTYPE foo [ !ENTITY xxe SYSTEM “file:///etc/passwd” ]
stockCheck>&xxe;

A

XML External Entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which OSI layer is affected by DoS attacks such as cutting cables and wireless jamming

A

OSI Layer 1: Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which OSI layer is often attacked by targeting insecure protocols or routers, usually comes from within the network, and includes MAC flooding or ARP poisoning?

A

OSI Layer 2: Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which OSI layer can be targeted remotely and include ping floods and ICMP attacks?

A

OSI Layer 3: Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which OSI layer involves TCP/UDP and is often attacked by port scanning?

A

OSI Layer 4: Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Parameter based, session restoration, DOM based, javascript based and XSS are all methods of what attack?

A

URL redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of DDOS attack is most common?

A

Network based

17
Q

What is the DOS technique that floods the target with enough data or requests that it can’t respond to all of them?

A

Resource Exhaustion

18
Q

Which DOS attack sends so many ICMP ping requests that it consumes the hosts network bandwidth and system resources?

A

ping flood

19
Q

Which DDOS attack relies on IP spoofing to generate overwhelming traffic from unrelated systems

A

reflected attack

20
Q

Which DDOS attack is like a ping flood, but instead of pinging the target directly, the attacker pings a lot of other systems with spoofed IP return addresses.

A

smurf attack

21
Q

Which DDOS attack floods random ports on a remote host. This causes the host to repeatedly check for the application listening at that port, and (when no application is found) reply with an ICMP ‘Destination Unreachable’ packet.

A

UDP Flood

22
Q

In which DDOS attack does the requester sends multiple SYN requests, but either does not respond to the host’s SYN-ACK response, or sends the SYN requests from a spoofed IP address.

A

SYN flood

23
Q

Which DDOS attack sends multiple malformed or malicious pings to a computer.

A

Ping of Death

24
Q

In the industrial sector, DDOS attacks can be particularly dangerous to which systems?

A

Industrial Control Systems (ICS)

25
Q

Which type of hacker describes someone who is new to hacking and is not particularly skilled?

A

Green Hat

26
Q

Which type of hacker is like a white hat hacker by Microsoft’s definition, but by other’s definition is a vengeful hacker?

A

Blue Hat

27
Q

Which type of hacker may be a hacker that hacks Linux, but also can describe a vigilante hacker who goes after black hats?

A

Red Hat

28
Q

Which web is hidden and does not show up on traditional search results?

A

Deep Web

29
Q

Which web is part of the deep web, but also requires additional software to access?

A

Dark web

30
Q

What is a piece of forensic data which is associated with malicious activity on a system or network. They can include IoAs found in logging systems; they also include unusual login behaviors or privileged actions, unexpected outbound network traffic, or unauthorized configuration changes

A

Indicators of Compromise (IOC)

31
Q

Is vulnerability scanning active or passive?

A

passive

32
Q

Which initiative was created by National Cybersecurity and Communications Integration Center (NCCIC) for collaborating on threat indicators. Vulnerability indicators can be quantified in standard formats such as CVSS, encoded in languages like OVAL, and shared by protocols such as SCAP.

A

Automated Indicator Sharing (AIS) initiative

33
Q

L2TP provides tunneling but not encryption. What should be combined with L2TP for a better tunnel?

A

IPsec

34
Q

Which protocol encrypts VPN traffic over SSL?

A

Secure Socket Tunneling Protocol (SSTP)

35
Q

What is used by admins to control computers that are connecting to the network over VPN?

A

Network Access Control (NAC)

36
Q

Which software is used by NTFS to provide file level encryption

A

Encrypting File System (EFS)