General Flashcards
Denies all traffic implicitly then allows based on rules.
Restrictive Firewall
Compares one packet at a time against rule set
Stateless Firewall
Maintains a state table of traffic connections and flows
Stateful firewall
Provides advanced malware protection and cloud participation
NGFW (Next Generation Firewall)
Uses traditional ACLS and inspects rules applied to interfaces
Classic firewalls
Permits all traffic implicitly and then denies based on rules
Permissive firewall
[Hijacking and Session Hijacking Attacks]
Cross-Site Scripting (XSS)
Affects hosts and web applications
Vulnerable website (injection attack)
Client browser trusts
Goal is to access personal info (session cookies)
User does not have to be authenticated
[Hijacking and Session Hijacking Attacks]
Cross-Site Request Forgery (XSRF)
Attempt to force use to executive unwanted actions on a web app
Targets ‘state changing’ request (ie transferring funds, changing an email address, etc…)
Usually involves social engineering (sending link via chat or email)
Requires that the user to already be authenticated, credential are present in the browser
[Public Key Infrastructure (PKI) Components
Certificate Revocation List (CRL)
Digital certificates can be revoked before they are set to expire
Main reason for for revoking a certificate:
Key compromise (44%)
Company ceased operations (26%)
A CRL contains a list of certificate serial numbers that have been issued by the CA and then revoked
Which specific type of malware often targets the BIOS, boot loader, kernel, or system files, and is difficult to detect since it is often initiates before the operating system has fully booted
Root kit
What category of malware can be actually be an entire operating system, smart device, gaming system, or even an automobile?
Spyware
Which statement is false about key loggers?
False: They can all evade special on-screen keyboard software.
True: They can also be used to study human-computer collaboration
They are used by spyware to capture passwords and credits card input.
They are also used to track employees or family members to adhere to acceptable use
Which type of virus simultaneously attacks the boot sector and executable files so that it combines the characteristics of file infector and boot sector viruses?
Multipartite
What is the function that Bots and Botnets do not perform
Do not: Corrupt routing tables
Do: Exfiltrate data
Scan memory
Log keystrokes
Mine cyber currency
When searching the Common Vulnerabilities and Exposures (CVE) list’s National Vulnerabilities Data (NVD), what scoring information is provided for each vulnerability?
Exploitability Subscore
CVSS Base Score
Impact Subscore
Which statement is not true concerning malware worms?
Not true: a worm usually spreads with user action and distributes throughout a single system kernel, components, and processes.
True: it is a special form of self-replicating virus
Classic example are Sasser, ILOVEYOU, Conflicker, and Stuxnet
A worm can consume resources, infiltrate data, or simply cause the CPU to waste cycles
Which one is not likely to be a common ransomware vector?
Not likely: Digitally signed upgrade
Likely: Powershell file
Infected website
Word macro
Archive file
Which is a specific form of malware, often part of multistage exploits, that is known for creating back doors to C&C (Command & Control) servers giving crackers access to a system?
RAT
What is it called when cryptomalware is delivered when a user innocently visits an infected website and downloads and installs it without their knowledge?
Drive-by
What team describes the malware that bundles up different type of malicious code into a single package and delivers it in am email attachment?
Polymorphic packer
Which specific form of malicious software is often used to generate a covert channel so that the remote attacker can access and control the system even on phones and other mobile devices?
Back door
Which of the following my expose you organization or a user to exploits?
Ransomware
Poor database RBAC
Hackivism
Spear phishing
Which statement is true concerning resources exhaustion?
It is an attack on availability
True or False
All architecture and design methodologies have weaknesses and vulnerabilities?
True
Used to access database, run batch jobs, or execute scripts
Application
These are sometimes referred to as “break glass” accounts
Emergency
Gives privileged access across all workstations and servers in a Windows domain
Domain Administrator
Typically privileged local or domain accounts that are used by an application or service to interact with the operating system?
Service
Commonly grants elevated access to infrastructure devices on an enterprise network.
Privileged user
Provides root access to a local host in order for IT staff to perform maintenance
Local Administrative
Which scenario is often related to synchronization errors on software code where malicious users can gain unauthorized access to a system or application
Race conditions
Which statement is false concerning programs for training end users in security awareness?
False: The first step in the program is to motivate management.
True: The AUP is an important aspect policy
It helps to offer incentives for keeping a secure environment
BYOD has complicated the issue of security awareness
Which statement is not true regarding certificate and key management?
Not true: Choose AAA or CRL over OCSP for revocation
True: Log all issuances and validation checking activities
Validate certificate chains
Use a fully-tested enterprise CA
During vulnerabilities scanning, you have discovered improper error handling on your internet web servers where detailed internal error messages are being exposed to unauthorized users to improper input handling or error handling.
Which statement would not be true on this scenario?
Not true: SQL injection can be exposed
True: Stack traces can be exposed
Database dumps can be exposed
Error codes can be exposed
Which would not be considered a vulnerable business process?
Would not: Using TLS and Suite B infected of SSL and IKEV1
Would be: Deploying self signed certificates
Lack of front-ended/back-ended cryptosystems on DMZ servers
Decoding against cyber insurance riders
Not fully vetting cloud and security providers
Which technology tries to control the use, modification, and distribution of copyrighted software and multimedia content?
DPM
Which tool serves as a memory scraper and a keystroke logger
PoSeidon
At which site can you find the Security Policy Project and the CIS Critical Security Controls as a free resource?
Sans.org
What function as an extension of IEEE 802.1X?
MACsec
Which statement are true regarding system misconfiguration
Human error is the number one vulnerability
Coding files should be stored in a secure document library
Configuration should first be tested in virtual lab
What are the characteristics of IPSec?
Main protocols are ESP and AH
Operates in transport or tunnel mode
Open frame work that supports Suite B and GET
Provides for confidentiality and anti-replay services
The Cisco ASA 5585-X is a dominant security appliance in the speciality platform category?
True or False
True
Which information devices would most likely connect to a printer in the supply room at your office?
Access switch.
Wireless Access Points typically create wireless LANs at which layers of the OSI model?
1 & 2
Which option is not a dynamic routing protocol?
Not: NAT
Is: OSPF
EIGRP
RIPV2
BGP
Which service can perform anti-spam, anti-virus, encryption, DLP, and more in your enterprise?
Mail gateway
Which network services provides logs collections, analysis, and forensics?
SIEM
Which service can be integrated into web security and email security solutions to be scan e-mail, IM, SMS, and webmail, for the presence of protected and sensitive corporation data?
DLP
Which proxy service would best be used for PAT, business logic, and XML purpose in the enterprise?
Translation proxy
Which technology can translate and convert media streams between different technologies such as SS7, 4G, LTE, networks, and PBX systems?
Media gateways
What is the scenario called when there is illegal usage of bit torrents for download pirated software into your corporate LAN, and the IPS sensor fails to alert you or block the traffic?
False Negative
Which Cisco industry controls access to enterprise resources and restricts the lateral movement of threats with micro segmentation?
NAC
An encryption gateway can not function on a single device between both an IPSec site-to-site VPN and a remote- access TLS VPN
Select if the statement is true or false.
False
Which type of event leads the logic bombs to trigger an exploit?
A number of times code executes.
A particular date and time
Mouse movements
On a popular holiday
What term describes a seemingly benign JPEG picture that may actually contain destructive malware?
Stegomalware
Trojan horse malware masquerades as a legitimate program.
What are the common examples of Trojan applications
Shareware utilities
Devices drivers
Freeware from P2P sites
Games
Use of Open-Source Intelligence
Intelligence data collected from public sources
Third party / legitimate ways
Open source threat intelligence
Major source of open source feeds.
Information Sharing and Analysis Organization (ISAOs)
Information Sharing Analysis Centers (ISACs)
Data execution prevention applies to which option?
Memory
Which removable media option is triggered when the device is plugged in?
Auto play
Users complain in the morning that an application that worked the day before no longer runs without crashing.
What is the most likely cause of the problem?
Update history.
RAT
Remote Access Trojan
Remote Access Trojan (RAT)
Masquerades as a different type of program than a Trojan, but rather than directly damaging the target, it opens a back door, exposing the computer to other threats, such as a keylogger.