MSBs Flashcards

1
Q

What is the key input to the secure stage of a secure mission?

A

Risk Mitigation Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This provides the final report to capture all of the lessons learned from the survey and secure stages of a secure mission.

A

Summary Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Serves to complete COA selection and deploy approved risk mitigation’s as outlined in the RMP.

A

COA Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provides the final evaluation of deployed risk mitigation’s

A

Risk mitigation validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Focused on conducting the training necessary to educate Local Cyber Defenders on the technical and procedural mitigation’s employed.

A

Education and Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 4 supporting objectives executed during a secure mission?

A

Education and Training
Course of action implementation
Risk mitigation validation
Summary reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key outputs of the Secure Mission?

A

Mission Defense Plan

Summary Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This outlines the residual risks after implementation.

A

Mission Defense Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the final product of the secure stage which captures all of the lessons learned.

A

Summary Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Any piece of information that objectively describes an intrusion.

A

Indicator of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Three types of Indicators of Compromise

A

Atomic, Computed, Behavioral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ip, addresses and email addresses

A

Atomic IOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A method an adversary uses to get to a target.

A

Threat Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 phases of a network attack.

A

Access, persistence, control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Utilizing any number of tricks to hide nefarious means.

A

Malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One day exploits or improperly configured server software.

A

Unpatched software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Adversary gains legitimate credentials of an account users access to a system.

A

Stolen Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Psychological manipulation of people into performing actions of divulging confidential information.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication (email)

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Adversary exploits a website known to be visited by its target

A

Watering hole

21
Q

Two different entities that trust each other

A

Trust relationship

22
Q

Attacker uploads nefarious code.

A

SQL injection

23
Q

Scripts executed within the users browser under the security context of the site they are visiting

A

Cross-Site Scripting (XSS)

24
Q

What are the four vertices of the diamond mode of intrusion analysis?

A

Adversary, victim, capability, infrastructure

25
Enables analysis to detect and mitigate intrusions.
Cyber kill chain
26
What are the seven phases of the cyber kill chain?
``` Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Objectives ```
27
Captures network traffic from a mission partner, generate logs and stores Pcap data
DIP Sensor
28
Passive open source traffic analyzer that performs live analysis of network events and creates log files . Conn, HTTP,DNS,FTP, Weird
Bro(Zeek)
29
A real time network intrusion detection system (NIDS) | Parses network traffic against a set of user-defined signatures
Suricata
30
An application that monitors and captures network traffic on an interface Uses internal elastic search for indexing separate from the ELK stack on the collector
Atkins (Moloch) Capture
31
This tool parses and normalizes data
Logstash
32
Indexes logs , also known as heart of ELK Stack
Elastic search
33
Visualization plugin for elastic search and dashboard tool, performs queries on indexed data
Kibana
34
Monitor and detect suspicious activities on hosts Agent based Aggregate event data
Endgame
35
Tool to view/search pcap data
Arkime (Moloch) viewer
36
Open source firewall /router Used for IPSec tunneling Segregates the dip systems from mission partner network
pfsense
37
Separate infrastructure from the mission partner network | Allows management through uncontested network
Out of Band
38
Relays management across a possible contested network
In-band
39
A text document that contains all the commands required to build an image
Dockerfile
40
A read-only template with instructions for creating a docket container
Image
41
A running instance of an image
Container
42
A mapping of container data to docker file system data
Volume
43
Containers can talk to each other, but they are isolated from the host
Bridge
44
Containers are not isolated and may use the hosts network directly
Host
45
Files are lost when the container turns on
Docker non persistence
46
Store the data where docker chooses
Volume
47
Stores the data in a specific spot
Bind-mount
48
Tool for managing multiple containers from one configuration file
Docker compose