General Flashcards

1
Q

Denies all traffic implicitly then allows based on rules.

A

Restrictive Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compares one packet at a time against rule set

A

Stateless Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maintains a state table of traffic connections and flows

A

Stateful firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provides advanced malware protection and cloud participation

A

NGFW (Next Generation Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uses traditional ACLS and inspects rules applied to interfaces

A

Classic firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permits all traffic implicitly and then denies based on rules

A

Permissive firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

[Hijacking and Session Hijacking Attacks]

Cross-Site Scripting (XSS)

A

Affects hosts and web applications

Vulnerable website (injection attack)

Client browser trusts

Goal is to access personal info (session cookies)

User does not have to be authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

[Hijacking and Session Hijacking Attacks]

Cross-Site Request Forgery (XSRF)

A

Attempt to force use to executive unwanted actions on a web app

Targets ‘state changing’ request (ie transferring funds, changing an email address, etc…)

Usually involves social engineering (sending link via chat or email)

Requires that the user to already be authenticated, credential are present in the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[Public Key Infrastructure (PKI) Components

Certificate Revocation List (CRL)

A

Digital certificates can be revoked before they are set to expire

Main reason for for revoking a certificate:
Key compromise (44%)
Company ceased operations (26%)

A CRL contains a list of certificate serial numbers that have been issued by the CA and then revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which specific type of malware often targets the BIOS, boot loader, kernel, or system files, and is difficult to detect since it is often initiates before the operating system has fully booted

A

Root kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What category of malware can be actually be an entire operating system, smart device, gaming system, or even an automobile?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which statement is false about key loggers?

A

False: They can all evade special on-screen keyboard software.

True: They can also be used to study human-computer collaboration

They are used by spyware to capture passwords and credits card input.

They are also used to track employees or family members to adhere to acceptable use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of virus simultaneously attacks the boot sector and executable files so that it combines the characteristics of file infector and boot sector viruses?

A

Multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function that Bots and Botnets do not perform

A

Do not: Corrupt routing tables

Do: Exfiltrate data
Scan memory
Log keystrokes
Mine cyber currency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When searching the Common Vulnerabilities and Exposures (CVE) list’s National Vulnerabilities Data (NVD), what scoring information is provided for each vulnerability?

A

Exploitability Subscore
CVSS Base Score
Impact Subscore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement is not true concerning malware worms?

A

Not true: a worm usually spreads with user action and distributes throughout a single system kernel, components, and processes.

True: it is a special form of self-replicating virus

Classic example are Sasser, ILOVEYOU, Conflicker, and Stuxnet

A worm can consume resources, infiltrate data, or simply cause the CPU to waste cycles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which one is not likely to be a common ransomware vector?

A

Not likely: Digitally signed upgrade

Likely: Powershell file
Infected website
Word macro
Archive file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which is a specific form of malware, often part of multistage exploits, that is known for creating back doors to C&C (Command & Control) servers giving crackers access to a system?

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is it called when cryptomalware is delivered when a user innocently visits an infected website and downloads and installs it without their knowledge?

A

Drive-by

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What team describes the malware that bundles up different type of malicious code into a single package and delivers it in am email attachment?

A

Polymorphic packer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which specific form of malicious software is often used to generate a covert channel so that the remote attacker can access and control the system even on phones and other mobile devices?

A

Back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following my expose you organization or a user to exploits?

A

Ransomware
Poor database RBAC
Hackivism
Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which statement is true concerning resources exhaustion?

A

It is an attack on availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False

All architecture and design methodologies have weaknesses and vulnerabilities?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Used to access database, run batch jobs, or execute scripts

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

These are sometimes referred to as “break glass” accounts

A

Emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Gives privileged access across all workstations and servers in a Windows domain

A

Domain Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Typically privileged local or domain accounts that are used by an application or service to interact with the operating system?

A

Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Commonly grants elevated access to infrastructure devices on an enterprise network.

A

Privileged user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Provides root access to a local host in order for IT staff to perform maintenance

A

Local Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which scenario is often related to synchronization errors on software code where malicious users can gain unauthorized access to a system or application

A

Race conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which statement is false concerning programs for training end users in security awareness?

A

False: The first step in the program is to motivate management.

True: The AUP is an important aspect policy

It helps to offer incentives for keeping a secure environment

BYOD has complicated the issue of security awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which statement is not true regarding certificate and key management?

A

Not true: Choose AAA or CRL over OCSP for revocation

True: Log all issuances and validation checking activities

Validate certificate chains

Use a fully-tested enterprise CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

During vulnerabilities scanning, you have discovered improper error handling on your internet web servers where detailed internal error messages are being exposed to unauthorized users to improper input handling or error handling.

Which statement would not be true on this scenario?

A

Not true: SQL injection can be exposed

True: Stack traces can be exposed

Database dumps can be exposed

Error codes can be exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which would not be considered a vulnerable business process?

A

Would not: Using TLS and Suite B infected of SSL and IKEV1

Would be: Deploying self signed certificates

Lack of front-ended/back-ended cryptosystems on DMZ servers

Decoding against cyber insurance riders

Not fully vetting cloud and security providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which technology tries to control the use, modification, and distribution of copyrighted software and multimedia content?

A

DPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which tool serves as a memory scraper and a keystroke logger

A

PoSeidon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

At which site can you find the Security Policy Project and the CIS Critical Security Controls as a free resource?

A

Sans.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What function as an extension of IEEE 802.1X?

A

MACsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which statement are true regarding system misconfiguration

A

Human error is the number one vulnerability

Coding files should be stored in a secure document library

Configuration should first be tested in virtual lab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the characteristics of IPSec?

A

Main protocols are ESP and AH

Operates in transport or tunnel mode

Open frame work that supports Suite B and GET

Provides for confidentiality and anti-replay services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The Cisco ASA 5585-X is a dominant security appliance in the speciality platform category?

True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which information devices would most likely connect to a printer in the supply room at your office?

A

Access switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Wireless Access Points typically create wireless LANs at which layers of the OSI model?

A

1 & 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which option is not a dynamic routing protocol?

A

Not: NAT

Is: OSPF

EIGRP

RIPV2

BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which service can perform anti-spam, anti-virus, encryption, DLP, and more in your enterprise?

A

Mail gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which network services provides logs collections, analysis, and forensics?

A

SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which service can be integrated into web security and email security solutions to be scan e-mail, IM, SMS, and webmail, for the presence of protected and sensitive corporation data?

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which proxy service would best be used for PAT, business logic, and XML purpose in the enterprise?

A

Translation proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which technology can translate and convert media streams between different technologies such as SS7, 4G, LTE, networks, and PBX systems?

A

Media gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the scenario called when there is illegal usage of bit torrents for download pirated software into your corporate LAN, and the IPS sensor fails to alert you or block the traffic?

A

False Negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which Cisco industry controls access to enterprise resources and restricts the lateral movement of threats with micro segmentation?

A

NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

An encryption gateway can not function on a single device between both an IPSec site-to-site VPN and a remote- access TLS VPN

Select if the statement is true or false.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which type of event leads the logic bombs to trigger an exploit?

A

A number of times code executes.

A particular date and time

Mouse movements

On a popular holiday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What term describes a seemingly benign JPEG picture that may actually contain destructive malware?

A

Stegomalware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Trojan horse malware masquerades as a legitimate program.

What are the common examples of Trojan applications

A

Shareware utilities

Devices drivers

Freeware from P2P sites

Games

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Use of Open-Source Intelligence

A

Intelligence data collected from public sources

Third party / legitimate ways

Open source threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Major source of open source feeds.

A

Information Sharing and Analysis Organization (ISAOs)

Information Sharing Analysis Centers (ISACs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Data execution prevention applies to which option?

A

Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which removable media option is triggered when the device is plugged in?

A

Auto play

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Users complain in the morning that an application that worked the day before no longer runs without crashing.

What is the most likely cause of the problem?

A

Update history.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

RAT

A

Remote Access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Remote Access Trojan (RAT)

A

Masquerades as a different type of program than a Trojan, but rather than directly damaging the target, it opens a back door, exposing the computer to other threats, such as a keylogger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Trojan Horse

A

Is a program that appears to be one thing, but is actually something else. The Trojan horse contains a malicious application and is often data destructive. Examples include programs at delete the file allocation table from a hard disk, delete disk partition, delete or overwrite data, or operating system files, and so forth.

65
Q

Logic bomb

A

Is a type of malware that is designed to attack a computer system based on a specific event, such as a calendar date.

66
Q

PII

A

Personally Identifiable Information

67
Q

ICMP

A

Internet Control Message Protocol (ICMP)

68
Q

NFC

A

Near Field Communication

Is a technology that allows devices that have a NFC chip to communicate over very small distances

69
Q

MDM

A

Mobile Device Management

70
Q

NAC

A

Network Access Control

71
Q

NAC

A

Provides the service required and integrates network interconnection devices such as switches, routers, and firewalls.

NAC can provide pre-admission security checks, post-admission controls, updates and corrections to client computers through automated remediation.

72
Q

TPM

A

Trusted Platform Module

73
Q

TPM

A

Is dedicated microprocessor used for securing computing hardware and providing crypto graphics support.

One of the most common uses for TPM is to provide full-disk encryption usually with an external key or passcode used for decryption.

74
Q

TLS

A

Transport Layer Service

75
Q

TLS

A

Is a protocol that sends encrypted data use Hypertext Transfer Protocol over Secure Sockets Layers (SSL). HTTPS uses TCP 443 to transmit data.

76
Q

SEH

A

Structured Exception Handler

77
Q

SEH

A

Is a Microsoft-specific mechanism.

78
Q

CVS

A

Concurrent Versions System

79
Q

CVS

A

Is used by developers to keep track of different versions of source code and manage large projects

80
Q

ASLR

A

Address Space Layout Randomization

81
Q

ASLR

A

Can be used by developers t prevent a memory-based attack

82
Q

DEP

A

Data Execution Prevention

83
Q

DEP

A

Stops malicious code by performing additional memory checks

84
Q

MFD

A

Multi-function devices

85
Q

MFD

A

Combines different features, including printing, scanning, and (usually) faxing.

86
Q

HSM

A

Hardware Security Module

87
Q

HSM

A

Is a physical network device that provides for key generations, as well as key storage and management, as a stand-alone device

88
Q

PKI

A

Public Key Infrastructure

89
Q

CA

A

Certificate Authorities

90
Q

CAB

A

Change Advisory Board

91
Q

CAB

A

Is defined as a group of people who can approve and evaluate a change that has to be deployed

92
Q

SCADA

A

Supervisory Control And Data Acquisition

93
Q

EAP

A

Extensible Authentication Protocol

94
Q

EAP

A

Supports various types of Authentication

95
Q

Kerberos port

A

88

96
Q

RADIUS port

A

1812

97
Q

SAML port

A

443

98
Q

TACACS+ port

A

49

99
Q

Kerberos

A

Is an open standard for authentication.

Features:

Native support for smart card logon

Mutual authentication

Delegation of authentication

100
Q

VPN

A

Virtual Private Network

101
Q

MFA

A

Multi Factor Authentication and single-sign on

102
Q

OTP

A

One-Time Password

103
Q

PIN

A

Personal Identification Number

104
Q

MSCHAP

A

Microsoft Challenge Handshake Authentication Protocol

105
Q

PPP

A

Point to Point Protocol

106
Q

CHAP

A

Challenge Handshake Authentication Protocol

107
Q

OAUTH

A

Open Authorization

108
Q

SAML

A

Security Assertions Markup Language

109
Q

PAP

A

Password Authentication Protocol

110
Q

SLIP

A

Serial Line Internet Protocol

111
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus

112
Q

TACACS+

A

Standard and is used with routers, switches, and other devices to provide authentication, authorization, and accounting support

113
Q

PAP

A

Is typically only used with non-Windows legacy operations systems that do not support password encryption.

114
Q

OAUTH

A

Is an open source implementation based on the SAML

115
Q

POLP

A

Principle of Least Privilege

116
Q

POLP

A

Is minimum rights are assigned for a task to be accomplished.

117
Q

Core principles of the Agile approach to software development are:

A

Team engagement and collaboration

Change-orientated projects

Interactions between develops and self-organized, informal teams

Continuous integrations to enhance the development process of applications

The division of projects into small tasks and stage

118
Q

AS

A

Authentication Server

119
Q

TGT

A

Ticket Granting Ticket

120
Q

TOPT

A

Time Based One Time Password

121
Q

TOPT

A

Is a password that is generated from a shared key and the current time stamp.

122
Q

HOTP

A

HMAC-based One Time Password

123
Q

HOTP

A

Is based on a shared key and an incrementing counter instead of a time stamp

124
Q

PIV

A

Personal Identity Verification

125
Q

CAC

A

Common Access Card

126
Q

AUP

A

Acceptable Use Policy

127
Q

AUP

A

Is a set of terms that define what users can and cannot do

128
Q

BPA

A

Business Partner Agreement

129
Q

BPA

A

Is used to establish a relationship between business partners

130
Q

SLA

A

Service Level Agreement

131
Q

SLA

A

Defines performance expectations and describes expected levels of service. Examples uptime and response times

132
Q

MoU

A

Memorandum of Understanding

133
Q

MoU

A

Letter of intent. As a formal agreement between two or more parties confirming their intentions and common goals

134
Q

PII include

A

Full name

SSN

Full Address

Credit card and account number

Biometric information

Personal Phone Numbers

135
Q

Linkable information

A

Post code

Date of Birth

Gender

Salary information

IP address

136
Q

ALE

A

Annual Loss Expectancy

137
Q

ALE formula is?

A

ALE= SLE * ARO

138
Q

SLE

A

Single Loss Expectancy

139
Q

ARO

A

Annual Rate of Occurrence

140
Q

Six main phases of incident response

A

Preparation

Identification

Containment

Eradication

Recovery

Lesson learned

141
Q

Preparation?

A

A company creates an incident response policy and trains the whole team to use it.

142
Q

Identification?

A

Focus on the actual incident and describes hot to make a back up of suspected disk, record evidence, and verify affected systems

143
Q

Containment?

A

Focus on limiting scope of the issue by protecting critical systems and shutting down services if necessary

144
Q

Eradication?

A

Is the process of removing the threat or issue that ya been identified.

145
Q

Recovery?

A

Fully operational system

146
Q

Lesson Learned?

A

Response team focuses on and documents the cost of the incident, recommendations, and communications problems.

147
Q

CTL

A

Certificate Trust List

148
Q

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

  • Logic bomb
  • Trojan Horse
  • Rootkit
  • Backdoor
A

Backdoor

149
Q

What is confusion

A

Output is drastically different from the input.

Bits in ciphertext are a result of multiple parts of the key.

Use non-linear table to translate data

150
Q

What is Diffusion?

A

Single input character changes will affect multiple output characters

Each input but should change half or more of the ciphertext bits
-avalanche effect

Makes patterns harder to spot.

151
Q

What is obfuscation?

A

• Good

Making the information difficult to understand
Hiding the real information from unwanted eyes
Protecting our intellectual property, protection our organization

• Bad
Hiding a payload to bypass protection systems
Concealing malicious code within legitimate code

152
Q

Symmetric uses?

A

Secret key

153
Q

Asymmetric

A

Public key

154
Q

Types of Symmetric Algorithms

A
DES
3DES
AES
RC4 
Blowfish/Townfish
155
Q

Asymmetric Privacy Algorithm

A

Encrypt with public key

Decrypt with private key

156
Q

Authentication Asymmetric Algorithm

A

Encrypt with private key

Decrypt with public key

157
Q

Types of Symmetric Algorithms

A
DES
3DES
AES
RC4 
Blowfish/Townfish
158
Q

Asymmetric Algorithm Types

A
Diffie-Hellman
RSA
DSA
Elliptic curve 
PGP/GPG
159
Q

Key stretching types

A

BCRYPT

PBKDF2