General Flashcards

1
Q

What is in CIA triad

A

Confidentially
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List 6 step incident response

A

Prepare
Detection and analysis
Containment
Eradication
Recovery
Post incident activity or lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the triple AAA

A

Stands for accounting, authentication, and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is MITREs model for post attack techniques called

A

ATT&CK
adversial tactics , techniques, and common knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List 7 steps of kill chain attack

A

Recon
Weaponization
Delivery
Exploitation
Installation
Command and control
Actions on objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the general 5 steps to hacking

A

Recon
Scanning
Gaining access
maintaining access
Covering tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 5 steps of pen test

A

Planning
Scanning
Gaining access
Maintaining access
Analysis & reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List examples of substitution ciphers

A

Rot13, Caesar cipher, and keyword cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is one time pad

A

It’s unbreakable if properly used. Each person would get copy of pad to encrypt message which was the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is symmetric crypto

A

Uses one key to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric key crypto uses what two ciphers and how do they encrypt

A

Block and stream
Block is by bytes while stream is bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List some symmetric key algorithms

A

Des,3des, and aes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List popular stream ciphers

A

RC4, seal, and ORYX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What two keys does asymmetric crypto use

A

Public and private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List common asymmetric algorithms

A

RSA, ECC, ECDSA, DSS, el gamal, and diffie hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List common hash algorithms

A

Sha, md5, and RACE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does a digital signature get made using PKI

A

First hashed
Encrypted using private key
Receiver uses public key to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ocsp versus crl

A

CRL is list download and checked
While online certificate services protocol checks certificate online to see if valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is ocsp stapling

A

Instead of web browser reaching out to ca. Web server caches response from oscp, and then staples response to certificate sent to client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 5 threat intelligence lifecycle steps

A

Planning & requirements
Collection and processing
Analysis
Dissemination
Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are pkcs

A

Public key cryptographic standards for different uses in PKI infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is pkcs 7 used for

A

Sign or encrypt messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is pkcs 10 used for

A

It’s standard to be used to request certificate from CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is pkcs 12 or pfx

A

File that stores private key, certificate chain, and certificate can be protected by password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are 2 use cases of pkcs 7

A

Store certificates or CRL lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does windows event logon type 2 mean

A

It was an interactive login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does windows event log type 3 mean

A

It was network login such as connection to shared drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does windows event logon type 10 mean?

A

Remote interactive such as rdp or terminal services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What trust model does full disk encryption use

A

Hardware root of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are standard operating procedures

A

Step by step instructions on how to carry out a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the iso 27000 standards

A

Series of standards that provide framework for info sec management practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is iso 27001

A

Framework and standards for information security management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is operational technology?

A

It is systems that are used to monitor and manage manufacturing or industrial process assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is an ics and scada system

A

industrial control systems
Supervisory control and data acquisition systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What vulnerabilities do legacy industrial systems like modbus possess

A

Don’t always support authentication, confidentiality, and replay protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the 7 logging facility levels in syslog

A

1 Alert
2 Critical
3 Error
4 Warning
5 Notice
6 Informational
7 Debug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is ntp and what port does it use?

A

Network time protocol
Uses udp port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is log normalization

A

Converting log data into particular data representation and categorizing consistently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Why should logs use UTC time

A

It’s universal can easily convert to whatever time zone analyst is working in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are the 4 areas in diamond model

A

Adversary
Capabilities
Infrastructure
Victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are 2 examples of hardware root of trust devices

A

TPM and HSM hardware security module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What do physical controls do?

A

Mitigate risks to physical security and also include technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What do administrative/managerial controls do?

A

Mitigate risks by implementing certain processes and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What do technical controls do?

A

Manage risk using technical measures such as antivirus or firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are key and compensating controls

A

Key are ones that are primary and can affect an entire process if they fail

Compensating replace impracticable or unfeasible key controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is nist sp 800-53

A

Security and privacy controls for info systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What 2 frameworks are common for cyber security

A

Iso 2700 series and nist sp 800-37 risk management and sp 800-35 security and privacy controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is iaas, paas, and saas

A

Iaas is cloud stuff like vps
Paas platform with some control like azure and
Saas is little to no control like office 365

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What else are counter measures called in risk management?

A

Security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is user acceptance testing

A

Where users test stuff like beta testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is regression testing ?

A

re-running functional and non-functional tests to ensure that previously developed and tested software still performs as expected after a change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What can regression testing help with in security ?

A

Make sure any new changes don’t introduce new security vulnerabilities

53
Q

What is machine code

A

Compiled form like a pe file

54
Q

What is assembly code

A

low-level programming language with a very strong correspondence between the instructions in the language and the architecture’s machine code instructions

55
Q

What is high level code

A

At a human readable level for humans

56
Q

What is a disassembler

A

Coverts compiled to assembly

57
Q

What is a decompiler

A

Converts compiled back into human readable output

58
Q

Do debuggers do dynamic or static analysis

A

Dynamic

59
Q

What are the 5 stages of threat intelligence

A

Planning & requirements
Collection & processing
Analysis
Dissemination
Feedback

60
Q

What are the 4 categories in threat intel

A

Strategic
Tactical
Operational
Technical

61
Q

What is in strategic threat intel category

A

High level for non technical audiences

62
Q

What is in tactical threat intel category

A

Details of tactics techniques and procedures TTPs

63
Q

What is in operational Intel category

A

Actionable info about incoming attacks

64
Q

What is in technical Intel category

A

Technical threat indicators like hash or C2 IP address

65
Q

What are the 3 ways to assess threat intel sources

A

Timeliness
Relevancy
Accuracy

66
Q

What is an ISAC

A

Information sharing and analysis centers

67
Q

Why are ISACs good to use?

A

They tend to be focused for certain industries like healthcare

68
Q

What are the two benefits of PAM?

A

Higher level privileges are temporarily given
Auditing is done to monitor what is done

69
Q

What is IAM versus PAM

A

Identity access management is 5 Ws of access to resources. Also management of passwords and user lifecycle
Privileged access management is subset of IAM. Identifies accounts needing privileged access, and specifies policies that apply to them

70
Q

What is Microsoft’s PIM

A

Provides time based and approval based privileged access. Some vendors include this in their PAM product they sell

71
Q

What is JIT PAm

A

Just in time which refers to given privileged access only for a certain time period to do the jobs or tasks that require it

72
Q

What is a sla

A

Service level agreement between provider and client about metrics, responsiveness, and responsibilities

73
Q

What is an SLO

A

Service level objective is an agreement about a specific metric or response time

74
Q

What is an SLI

A

Service level indicator is used to measure compliance with a SLO and SLA

75
Q

What are operational controls

A

Executed by company personnel during day to day operations

76
Q

3 examples of operational security controls

A

Change management
Security awareness training
Business continuity plan

77
Q

What are deterrent controls

A

Includes some preventative controls like guard dog. Meant to deter someone like cctv or warning sign

78
Q

What are detective controls

A

Used to investigate an incident examples are log files and CCTV

79
Q

What are Corrective/responsive controls

A

Actions you take to recover from incident like restore from back up tape. Or a fire suppression system

80
Q

What are preventative controls

A

In place to deter an attack like security guard with dog. Disabling user accounts and OS hardening

81
Q

What is DAC

A

Discretionary access control based on user and permission to objects such as NTFS full control

82
Q

What is mandatory access control?

A

Based on classification level of data such as top secret, secret, and confidential

83
Q

In Linux permissions what are these area -r-srwxr-x

A

Left part is type such as d for folder, l for link, and - for normal file
The next 3 parts are permissions left is owner,group, and all others
s means a setuid has been set and regular user will execute it with privileges of owner

84
Q

What is useful about sticky bit in Linux

A

Has t means anyone can write but only owner can delete files

85
Q

What is time offset

A

Regional time of where data was collected

86
Q

What is Time synchronization ?

A

Evidence from multiple time zones put in one time such as UTC. Also a protocol like NTP used so all devices have correct time

87
Q

What port does ntp use

A

Port 123

88
Q

What is STIX

A

It’s a standard for sharing information about cyber threats and to share cyber threat intel. Version 2 is json

89
Q

What is a Stix domain object ?

A

Sdo’s allow you to categorize each piece of info with specific attributes

90
Q

What is a STIX relationship object?

A

Way to link data there are 2 relationship and sighting

91
Q

What is TAXII

A

A protocol to share threat intelligence data

92
Q

What is the diamond model usually used for?

A

Use threads to show how an attacker behaves during attack. Can be mapped to kill chain

93
Q

What is threat modeling ?

A

Proactive way they uncover threats and how they are doing it

94
Q

What is the open source testing methodology manual OSSTMM?

A

Provides a guide on performing a security test or audit

95
Q

What is the owasp testing guide?

A

Provides a guide to testing web applications

96
Q

5 steps part of risk assessment

A

Gather info about what assets are there, applications, and IT systems
Define and classify assets
Explore potential vulnerabilities
Explore potential threats
Create mitigation strategies

97
Q

What is passive scanning

A

Using sources such as OSINT, and traffic captures. No direct interaction with host

98
Q

What is active scanning

A

Provides more details like updates installed on machine
Port scanning is another example

99
Q

What is device fingerprinting

A

Uniquely identifies assets on device such as what OS they are running

100
Q

What is a map scan?

A

Wide scan that shows all assets on a network such as LAN

101
Q

Why is credentialed scanning better than non credentialed

A

Provides more detail non credential may not have all permissions

102
Q

Agent versus non agent vulnerability scanning ?

A

Credentialed by default, doesn’t use as much bandwidth, increased management over head

Agentless less overhead,can be credentialed or not, won’t always provide all information without configuration changes

103
Q

What is a cpe in vulnerability scanning?

A

Way to show info about os,hardware and software such as OS running

104
Q

What is the point of a CVSS score?

A

Metric for comparing and prioritizing vulnerabilities

105
Q

What is a true positive

A

Legit attack detected

106
Q

What is a false positive

A

Alert when there was no attack

107
Q

False negative

A

No alarm raised but attack happened

108
Q

True negative

A

No alert given when legit activity occured

109
Q

What are the CVE score levels

A

From 0 none
0.1-3.9 Low
4.0-6.9 medium
7-8.9 High
9-10 critical

110
Q

What is the attack vector metric in CVSS

A

Reflects context by which vulnerability is exploitable

111
Q

What are the 3 metrics in CVSS score

A

Base required
Temporal

112
Q

What are the 4 attack vectors?

A

Network, adjacent, local, and physical

113
Q

In CVSS score what is the attack complexity?

A

Measure conditions beyond attackers control there are two low and high

114
Q

In CVSS score what are privileges required

A

Describes privileges attacker must have none,low,and high

115
Q

In CVSS score what is user interaction

A

Metric measures if a other user is required to participate in successful compromise. None or required like phishing link

116
Q

What does dynamic ARP inspection do?

A

It checks a database such as the DHCP snooping database to prevent arp spoofing.

117
Q

What does DHCP snooping do?

A

Builds a database of Mac and DHCP leases. Which helps DAI against arp spoofing. Also prevents rogue DHCP servers and DHCP starvation attacks

118
Q

What is a kerberoasting attack?

A
119
Q

What is an XXE web attack and what is the typical field used?

A

An attack that allows one to interfere with an applications processing of xml data. Typically the external entities field is used which loads stuff from outside xml file

120
Q

What are the 4 types of XXE attacks?

A

Exploiting to retrieve files
Used to perform SSRF
Blind XXE to exfiltrate data out of bound
Blind XXE to retrieve data via error messages

121
Q

What is a local file inclusion web vulnerability?

A

Attacker tricks website into running or exposing files

122
Q

What is a remote file inclusion web vulnerability?

A

An attacker forces webserver to include code and run code form remote url.

123
Q

What is cross site scripting XSS?

A

Allows an attacker to manipulate web server to run malicious code for other users

124
Q

What is a reflected XSS attack?

A

Malicious script comes from HTTP request

125
Q

What is a stored XSS attack and what is one example?

A

When an app receives data from untrusted source and includes it in later http responses

An example is a comment on a web server page that will run malicious code

126
Q

What are DOM based cross site scripting

A

An app contains client side JavaScript that processes data from untrusted source in malicious way

127
Q

What is a cross site request forgery CSRF web attack?

A

An attacker exploits web app to make users do action they didn’t intend to do

128
Q

How do you prevent cross site request forgery attacks?

A

Use same site cookies
And or a unique CSRF token

129
Q

What is a server side request forgery?

A

Web app attacked to make vulnerable backend server run malicious code