Info I Got Wrong Flashcards
Error detecting used to detect accidental changes to data
Cyclic redundancy check (CRC)
What is another name for a directory traversal or a path traversal?
HTTP attack
What is a swap file?
Temporary files on a hard disk used as a virtual memory
Example of order of volatility
Processor cache, RAM, swap file, HDD
What is a false antivirus pop-up or notification
Rogue AV
What is the European version of PII?
Sensitive personal info (SPI)
Moving your servers and computers into the cloud
IaaS
What is a known threat?
When something can be identified using signatures and patterns
Cloud applications
SaaS
Runtime containers for running different language code
FaaS
What do you add at the end of a firewall’s ACL?
Implicit deny
A username and password is an example of what?
PAP Authentication
What are the most common vulnerabilities found on Windows and Linux systems?
Missing patches.
Automated injection of breached usernames and passwords to gain access fraudulently
Credential stuffing
If you run a vulnerability scan on a Network and only find a few critical vulnerabilities what did you do wrong?
You did not run a credential scan.
Buffer overflow’s are most easily detected by what?
Static code analysis
How do you renew a service certificate?
Certificate signing request (CSR)
What is a key escrow?
It stores keys.
OCSP
Status of certificates that tells if it is good, revoked, or unknown.
What is the strongest response to an incident?
Isolation
Is degaussing a method of purging or destruction?
Purging
What is a server area fire extinguishing system?
FM-200
Why is SMS not a good idea for multi factor authentication?
It may be accessible to attackers through VOIP.
Where does a user agent request a resource from during a SAML transaction?
A service provider (sp)
Who has the ultimate responsibility for maintaining confidentiality, integrity, and authentication in a system
Data owner
Who is in charge of data quality, labeling, identification, and ensuring that data is collected and stored in accordance with laws?
Data steward
Who manages the system where data is stored, manages access control, encryption, back up and recovery?
Data custodian
Who is in charge of PII and PHI?
Privacy officer
What is the time that you must have services back up in?
RTO
What account do you use for a kiosk? And why?
A guest account, because it has limited capability no privacy and is disabled by default.
Who ensures that organization processes personal data in accordance with applicable data protection rules?
Data protection officer
What is a secure protocol for remote access services?
CHAP
What verifies the device drivers during Windows startup?
Early Launch Anti Malware (ELAM)
Where do you store certificates in a server?
Hardware Security Module (HSM)
What is the certificate that you see in the address bar of a website (the lock icon)?
Domain validation certificate (DV)
Certificate that validates that software was not altered?
Code signing certificate
DIG
Command used to look up information from DNS servers. More advanced than nslookup