Linkedin Notes Flashcards

1
Q

What are the 7 stages of cyber Kill chain

A

Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and control
Actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four tenants of zero trust?

A

1) Just in time access (jita)
2) Just enough access (jea)
3) Tokenisation or encryption
4) Adaptive policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

At which country was Stuxnet targeted?

A

Iran. USA wanted to hinder their nuclear programme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An exploit is called zero day until what occurs?

A

A patch is realised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a PUP?

A

Potentially Unwanted Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the software that is used to store a payload onto a target computer?

A

dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main assumption in a zero trust approach?

A

The network perimeter has been breached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mark Abene was, at different times, in both LOD and MOD. What was his internet nickname?

A

Phiber Optik

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tasks can be run using mpcmdrun at the command line.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which variant of Linux had a keylogger maliciously installed?

A

Mint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does Windows Defender offers cloud protection.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the EICAR string used for?

A

testing anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three Windows Firewall network types?

A

domain, private, public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Windows Firewall can mandate secure connections. What protocol does it enforce?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NATing is used to filter malware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zedlan can read normal windows logs.

17
Q

Which iptables parameter do you use to instruct the firewall to block packets?

19
Q

What is the normal last command on a set of firewall rules?

A

Drop all packets

20
Q

What switch setting can you use to do both TCP and UDP scans?

21
Q

What switch setting do you use to do a network scan for active hosts?

22
Q

Running netcat with only the IP address and port will put it into which mode?

23
Q

Which switch can you configure on a sender to set a timeout when doing a file transfer?

24
Q

Session connection can be automated.

25
Q

Netcat can detect the IP address of an incoming connection.

26
Q

Nessus can only scan a single system in a scan run.

27
Q

A web scanner cannot be used to proxy web traffic.

28
Q

Who or what is the victim of a cross-site scripting attack?

A

a visitor to the target website

29
Q

Scans can be run with or without credentials.

30
Q

Which company produces the annual Top Ten Web Threats?

A

OWASP
The Open Worldwide Application Security Project

31
Q

What logic clause can be injected to achieve an SQL injection attack?

A

True, 1=1, 0=0

32
Q

UDP traffic requires a three-way handshake.

33
Q

What kind of traffic does Wireshark capture?

A

UDP, TCP, Web

34
Q

HTTP traffic packets are obfuscated.