Módulo 06 - Resiliency and Site Security Flashcards

1
Q

Define:
Environmental Design (Physical Security)

A

Security approach that uses the built environment to enhance security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List:
Environmental Design options

A
  1. Barricades and Entry/Exit point
  2. Fencing
  3. Lights
  4. Bollards (Coisa de ferro ou cimento controlado remotamente que impede a passagem de veículos)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List:
Lock types

A
  1. Physical
  2. Electronic
  3. Biometric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define:
PACS - Physical Access Control System

A

Designed to control who can access specific locations within a building, essential to protect access badges (NFC cards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List:
The use of AI and camera systems

A
  1. Motion Recognition
  2. Object Detection
  3. Drones/UAV
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List:
Type of alarms

A
  1. Circuit
  2. Motion Detection
  3. Noise Detection
  4. Proximity
  5. Duress
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List:
Types of sensors

A
  1. Infrared
  2. Pressure
  3. Microwave
  4. Ultrasonic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Acronym:
RFID

A

Radio Frequency ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List:
Common Physical Attacks

A
  1. Brute Force
  2. Environmental
  3. RFID Cloning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the fundamental concept in network monitoring?

A

Know which computer are the big receivers and senders of information in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List
Network Monitoring Tools

A

ping
tracert/traceroute
pathping
netstat
route
arp
nslookup/dig
ipconfig/ifconfig
hping
netcat
IP scanners
nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define:
Passive reconnaissance

A

Gathering information on the target with no direct interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List:
Passive reconnaissance methods

A
  1. Packet sniffing
  2. Eavesdropping
  3. OSINT - Open Source Intelligence
  4. Network Traffic analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Acronym:
OSINT

A

Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define:
OSINT - Open Source Intelligence

A

Collecting data from public sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define:
Active reconnaissance

A

Gathering information on a target by probing and interacting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List:
Active reconnaissance techniques

A
  1. Port scanning
  2. Service enumeration
  3. OS fingerprinting
  4. DNS enumeration
  5. Web Application Crawling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List:
Type of reconnaissance

A
  1. Passive
  2. Active
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List:
Target information to extract

A
  1. Security posture (Physical and network)
  2. Narrow the focus for attack
  3. Potential vulnerabilities
  4. Create a network map
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List:
Reconnaissance tools

A
  1. OSINT framework
  2. theHarvester
  3. Shodan
  4. DNSenum
  5. curl and wget
  6. Scanless
  7. Nessus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Acronym:
IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Acronym:
IDS

A

Intrusion Detective System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define:
Intrusion Prevention System

A

Detects attacks and suspicious activity and automates responses to the malicious actitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define:
Intrusion Detection System

A

Detect attacks and suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

List:
Threat traffic label

A
  1. Positive
  2. False positive
  3. Negative
  4. False negative
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

List:
Detection methods

A
  1. Signature-based
  2. Heuristic-based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

List:
IDS/IPS implementation types

A
  1. Host-based H(IDS)
  2. Network-based (NIDS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Acronym:
HIDS

A

Host-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Acronym:
NIDS

A

Network-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define:
Trend Analysis

A

Consists on understanding an environment over time, identifying patterns.

Easily identifying false positives or unnecessary alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define:
Q: Protocol analyzer

A

A tool (hardware or software) used to monitor and analyze network traffic, also known as packet sniffer or network analyzer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

List:
Q: Common protocol analyzer tools

A
  1. Wireshark.
  2. Tcpdump.
  3. Ettercap.
  4. Dsniff.
  5. Cain and Abel.
  6. Windump.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define:
Q: SecOps protocol analyzer usage

A

Identifies network vulnerabilities, such as malformed packets, open ports, or sensitive data sent in cleartext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define:
Q: System fingerprinting

A

Identifying a system’s operating system by analyzing how it responds to different types of network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define:
Q: TCP handshake flags

A

Indicators within TCP packets that help identify the state of a connection during the handshake process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define:
Q: Packet sniffing

A

Using a protocol analyzer to capture and analyze network packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Acronym:
NIC

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

True or false:
A protocol analyzer is always capable of listening to every packet on the collision domain

A

False.

Except when the NIC is on p-mode (Promiscous mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define:
Q: Network attack

A

A: A strategy or technique used by threat actors to disrupt or gain unauthorized access to systems via a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

List:
Q: Stages of the cyberattack lifecycle

A
  1. Reconnaissance.
  2. Credential harvesting.
  3. Denial-of-service (DoS).
  4. Weaponization, delivery, and breach.
  5. Command and control (C2).
  6. Lateral movement and privilege escalation.
  7. Data exfiltration.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Define:
Q: Reconnaissance

A

A: The stage where threat actors gather information about the network, including host discovery, service discovery, and fingerprinting.

42
Q

Define:
Q: Credential harvesting

A

A: Reconnaissance activity where attackers attempt to learn passwords or cryptographic secrets for authenticated access.

43
Q

Define:
Q: Denial-of-service (DoS)

A

A: An attack that reduces the availability of a resource by overwhelming it with excessive requests or exploiting vulnerabilities.

44
Q

Define:
Q: Distributed Denial-of-Service (DDoS)

A

A: A type of DoS attack launched from multiple hosts, often using a botnet to overwhelm the target.

45
Q

Define:
Q: Command and control (C2)

A

A: Techniques and malicious code enabling attackers to remotely operate and maintain access to compromised systems.

46
Q

Define:
Q: Lateral movement

A

A: The process where attackers move from host to host or network segment to escalate privileges and expand access.

47
Q

Define:
Q: Data exfiltration

A

A: The unauthorized transfer of sensitive data from a system to an attacker’s remote machine.

48
Q

Define:
Q: SYN flood attack

A

A: A DoS attack exploiting the TCP handshake by withholding the ACK packet, causing resource exhaustion on the victim

49
Q

Define:
Distributed reflected DoS (DRDoS)

A

A DDoS attack where the attacker spoofs the victim’s IP, causing third-party servers to overwhelm the victim with responses.

50
Q

Define:
Amplification attack

A

A reflected attack exploiting application protocols to force targets to respond with large amounts of data, consuming bandwidth.

51
Q

List:
Protocols commonly targeted in amplification attacks

A
  1. DNS (Domain Name System).
  2. NTP (Network Time Protocol).
  3. CLDAP (Connectionless Lightweight Directory Access Protocol).
  4. Memcached.
52
Q

Define:
Asymmetric threat

A

A situation where attackers achieve effective attacks despite having fewer resources than the victim.

53
Q

Define:
Botnet

A

A network of compromised devices used by attackers to launch DDoS attacks or other malicious activities.

54
Q

Define:
DDoS indicators

A

Traffic spikes without legitimate explanation, often mitigated with high-availability services like load balancing or cluster services.

55
Q

Define:
On-path attack

A

A threat actor intercepts, monitors, relays, and potentially modifies communication between two hosts.

MITM - Man In The Middle

56
Q

Define:
ARP poisoning

A

An attack using unsolicited ARP replies to associate the attacker’s MAC address with a target IP, redirecting network traffic.

57
Q

Define:
DNS poisoning

A

A technique to compromise DNS name resolution by inserting false domain-to-IP mappings.

58
Q

Define:
DNS client cache poisoning

A

Modifying a client’s HOSTS file to redirect traffic by placing false name-to-IP address mappings.

59
Q

Define:
DNS server cache poisoning

A

Corrupting records held by a DNS server, often via spoofed responses to recursive queries or DoS attacks.

60
Q

Define:
DNS-based on-path attack

A

A combination of ARP poisoning and spoofed DNS responses to redirect victim traffic to malicious servers.

61
Q

Define:
Typosquatting

A

A technique where attackers create malicious sites mimicking legitimate ones to exploit users’ typographical errors.

62
Q

Define:
Amplification attack (DNS)

A

An attack exploiting DNS protocol weaknesses to force a target to respond with a large amount of data, consuming bandwidth.

63
Q

Define:
DNS attack indicators

A

Anomalies in DNS logs, such as spikes in lookup failures or communication with suspicious domains.

64
Q

List:
Examples of DNS attack indicators

A
  1. Unusual DNS queries.
  2. Suspicious IPs or domains.
  3. DNS lookup failure anomalies.
65
Q

Define:
Recursive DNS query

A

A query where a DNS server retrieves an answer from an authoritative server on behalf of a client.

66
Q

Define:
Memcached attack in amplification

A

Exploiting the Memcached database caching system to perform large-scale DDoS attacks.

67
Q

List:
Common DNS attack methods

A
  1. DNS poisoning (client and server).
  2. DNS-based on-path attacks.
  3. DRDoS attacks using DNS.
  4. Typosquatting.
68
Q

Define:
Shellcode

A

A minimal program designed to exploit OS vulnerabilities to gain privileges or drop backdoors.

69
Q

Define:
Credential dumping

A

Malware extracting credentials from files like SAM or processes like lsass.exe, or using DCSync to replicate domain credentials

70
Q

Define: Persistence

A

A: A technique ensuring malware restarts after a reboot or logoff, often using registry keys, scheduled tasks, or WMI events

71
Q

Define: Bash

A

A: A command shell and scripting language used in Linux and pre-Catalina macOS

72
Q

Define: Macros

A

A: Scripts used in applications like Microsoft Office, often written in VBA, potentially opening shells for malicious attacks.

73
Q

Acronym: VBA

A

A: Visual Basic for Applications.

74
Q

Acronym: RAT

A

Remote Access Trojan.

75
Q

True or False:
Python is unsuitable for developing malware because it cannot run on non-Windows systems.

A

False

Python can run on multiple operating systems, including Linux, macOS, and Android.

76
Q

True or False:
PowerShell scripts require an executable to run, making them easy to detect.

A

False

PowerShell scripts can run directly in system memory, making them fileless and harder to detect.

77
Q

True or False:
Macros are always disabled by default in all Microsoft Office versions.

A

False

Macros are disabled by default only in newer versions; users must manually enable them.

78
Q

Define: Shellshock

A

A malware exploiting a flaw in Bash to inject malicious commands on Linux and macOS systems.

79
Q

Define: Cmdlets

A

Tiny PowerShell scripts performing specific functions, often used to automate tasks in Windows.

80
Q

Define: Python’s use in malware

A

A: Python is used to develop malware like RATs, allowing functions such as screenshots, remote webcam access, and web requests.

81
Q

Q: Acronym: SAM

A

A: Security Account Manager.

82
Q

Q: Acronym: WMI

A

A: Windows Management Instrumentation.

83
Q

Define: Rainbow table

A

A: A precomputed table of passwords and their hashes used to quickly crack hashed passwords without brute-forcing.

84
Q

Define: Salting

A

A: Adding random characters to the beginning or end of a password before hashing to create unique hashes and defend against rainbow attacks.

85
Q

Define: Password spraying

A

A: A brute-force method where the attacker tries the same password across multiple accounts to avoid lockout policies.

86
Q

Define: Dictionary attack

A

A: A password attack using a predefined list of common words and phrases to guess passwords.

87
Q

Define: Social engineering

A

A: A manipulation technique where attackers exploit human behavior to obtain sensitive information, such as passwords

88
Q

Define: Shoulder surfing

A

A: An attack where an attacker observes a user typing passwords or other sensitive information.

89
Q

Q: Acronym: NTDS.DIT

A

A: Active Directory credential store.

90
Q

True or False: Password spraying targets one account with many passwords to avoid lockout policies.

A

A: False: Password spraying uses the same password across many accounts to bypass lockout policies.

91
Q

True or False: Salting hashes prevents rainbow table attacks.

A

A: True: Salting adds unique characters to hashes, making them immune to precomputed rainbow tables.

92
Q

True or False: Dictionary attacks are ineffective against strong, complex passwords.

A

A: True: Dictionary attacks are only effective against weak, common passwords.

93
Q

True or False: Online brute-force attacks are faster than offline brute-force attacks.

A

A: False: Offline attacks are faster since they do not interact with authentication systems or lockout policies.

94
Q

True or False: A rainbow table must be generated for each specific hashing algorithm.

A

A: True: Different hash algorithms require distinct rainbow tables due to variations in hashing processes.

95
Q

Define: Dumpster diving

A

A: A social engineering technique where attackers search through discarded items for sensitive information.

96
Q

Q: Define: Offline password attack

A

A: An attack where password hashes are obtained and cracked without interacting with the authentication system.

97
Q

Define: rcrack

A

A: A tool used to crack password hashes using rainbow tables

98
Q

True or False:

Strong passwords are the best defense against brute-force and dictionary attacks.

A

A: True:

Complex, long passwords with mixed character types reduce the effectiveness of these attacks.

99
Q

True or False:

Salting ensures two identical passwords produce different hashes.

A

A: True:

Salting adds unique values, making hashes distinct even for identical passwords.

100
Q

True or False:

Lockout policies prevent all brute-force attacks.

A

A: False:

Password spraying and offline attacks can bypass lockout policies.

101
Q

Acronym: Rtgen

A

Rainbow table generator

102
Q

Acronym:
Rtsort

A

A program that sorts rainbow tables for binary search.