Final Tuning Flashcards

1
Q

What can cause nmap to not see hosts?

A

If it is not running services, or if it has a firewall that prevents responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BIA

A

Business Impact Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SLA

A

Service Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BPA

A

Business Partner Agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MOU

A

Memorandum of Understanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After running Scalpel what should you do?

A

Review the contents of the scalpelout folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What scans should you use to understand what information is available to a potential external attacker about the system as well as what damage they may be able to cause on a web application server for public access?

A

Web application vulnerability scans, external network scans, port scans.

An internal network scan would provide an insider’s perspective so would not provide the data needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ITIL

A

Provides guidance on best practices for implementing IT service management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ISO

A

Provides high level standards for a wide variety of business and manufacturing processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

COBIT

A

Provides control objectives for IT governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PCI DSS

A

Provides security standards for handling credit card information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

strings command

A

Prints strings of printable characters in a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The sudoers file, output of groups command, and the stat command can all provide ___

A

Useful info about user or file permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Heuristic detection rules on an IPS are a valid way to ____

A

Prevent port scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST functional impact- Medium

A

Loss of ability to provide a critical service to a subset of system users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIST functional impact- High

A

Entire network goes down

17
Q

NIST functional impact- Low

A

Single switch down or network slows down

18
Q

NIST Tier 3 Risk Management Program

A

Repeatable
There is an organization wide approach to managing cyber risk

19
Q

NIST Tier 4 risk management program

A

Adaptive
Organization wide approach to managing cyber risk that uses risk-informed policies, processes, and procedures to address potential cyber security events

20
Q

Method to wipe all of an SSD

A

ATA secure erase command

21
Q

Degaussing is used for ____

A

Magnetic media such as tapes, not effective on SSDs

22
Q

After identifying a compromised system, you determine that the system is beaconing to a group of fast flux DNS entries. What technique can you use to identify other infected hosts?

A

Log DNS queries to identify compromised systems

23
Q

/etc/shadow

A

Contains password hashes

24
Q

Where on a Windows system can you look for evidence that files were deleted?

A

Windows Registry
MFT
INDX files