Phase 4 Flashcards

1
Q

What are the default windows event logs?

A

System, security, application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which default windows tool is used to view windows logs?

A

Event viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the default location for log files in Linux?

A

/var/log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In addition to event files (*evtx), in which formats can you save windows logs?

A

Xml(.xml), text(.txt), comma separated value (*.csv)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which two products were combined to create a SIEM?

A

Security event manager, security information manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the default port for communications with elasticsearch?

A

9200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the default port for communications with kibana?

A

5601

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which operational level do cyber professionals generally think at from three discussed in this lecture (introduction to strategy?

A

Tactical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which component of the log stash pipeline is closest to the raw data?

Input
Filters
Elastic search
Output

A

Input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What level requires communication of a plan and organizational buy-in of the strategy?

A

Strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the default port utilized by log stash to communicate with elastic search ?

A

9200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At which level is the vision of the organization laid out?

A

Strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After installing filebeats on a server to pull the syslog files, what port needs to be configured for communications on the log stash server, by default?

A

5443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Strategy is: (5 things)

A

Built with consideration of the threat
Planned
Built upon experience
Holistic
The efficient use of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the filter component accomplish in the log stash pipeline?

A

Allows customization of the search criteria used by kibana when pulling data from elastic search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Does the national security strategy discuss tactics? ( true or false)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

all elastic stack components must be installed on the same server, true or false?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Strategic leaders must balance and prioritize risk? True or false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which elastic stack component creates data visualizations?

A

Kibana

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the “must haves” for organizational strategy? 4 things

A

Vision
Practice
Include all sectors
Consider all levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Using the layered security model which tool is used at every layer?

A

SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Strategy is not : (3 choices)

A

Leadership
Benchmarking
Best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How many pillars does the us 2017 national security strategy have?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who would find the national security strategy document useful?

A

Everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Leaders of strategic planning map out objectives for 1-2 years and are classified as which level?

A

Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Under the products of a strategic leader, match the first steps to what they include: 4 steps

A
  1. Name the organization
  2. Number of people and subunits
  3. Major resources and capabilities
  4. Identify significant facilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What can a well-communicated vision for an organization do? 4 things

A

Stretch aspirations
Unite the teams in a common effort(vision)
Establish and inspire performance
Set expectations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What question does the mission answer?

A

Why do we exist?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Name the seven factors for environmental analysis

A

International
Political
Economic/budget
Social
Technology
Demographic
Legal/regulatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Select the three devices level security tool examples using a bottom-up approach
Input validation
Identity access management
Intrusion prevention systems
Data loss prevention
2FA
firewalls

A

Intrusion prevention systems
2FA
firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Using the define the problem stage of operational design, who needs to contribute to the problem definition?

A

Everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Operational environment can include: 3 things

A

Conditions
Influences
Circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

During the first linked YouTube video, in the slides, on modern information warfare, what classi😾fication

A

State-sponsored against a private company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Referencing the YouTube video, what device is used as a way to pay for everything in China?

A

Huawei phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

During the second linked YouTube video on modern information warfare, how long has information warfare been used?

A

Since biblical times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Select the variables that drive changes in the operational environment continuous assessment :

The refinement or a change in goals
Changes in the environment
The addition of new actors
Strategic context and systematic nature of the problem
Changes in resources, methods, or processes
Strategic trends
Strategic guidance

A

The refinement or a change in goals
Changes in the environment
The addition of new actors
Changes in resources, methods, or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Name the two vital components that make up the most important steps in operational design

A

Describe the operational environment
Define the problem to be solved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the 4th step of the basic operational approach?

A

Identify the operational limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When building a business strategy, what questions are used to define (ENDS)?

A

What is the end state that must be achieved, how is it related to the strategic end state, and what objectives must be achieved to enable that end state?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

True or false
Operational design as a business strategy impairs dialog between leaders and staff

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

True or false
A better understanding of the problem and its root causes is a direct potential value-added for business strategy using operational design

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Complex adaptive systems are unpredictable. True or false

A

True

43
Q

Name a model that uses a manned simulation

A

War games

44
Q

When developing an operational approach, what questions must the mission answer?

A

Who, what, when, where, and why

45
Q

What is the aim of framing the operational environment?

A

The aim is to understand existing conditions in order to drive the set of conditions we wish to see at the end of operations

46
Q

Define the term system used in operational design

A

A functionally physically and/or behaviorally related group Of regularly interacting or independent elements; that group of elements forming a unified whole

47
Q

What are the 2 framing stages of operational design methodology

A

Frame operational environment
Frame the problem

48
Q

What is the primary product of operational design when applied to the cybersecurity elements of a business?

A

Intelligence

49
Q

Using the OODA loop, what does the D stand for?

A

decide

50
Q

In a production environment, why is it important To know which version of splunk is installed?

A

Testing and compatibility with all components

51
Q

What is the default location for the splunk installation?

A

/opt/splunk

52
Q

During the Orient stage of the OODA loop, what is the spotlight put on for the blue force

A

Prioritized information needs of the decision maker

53
Q

Where is the splunk application (binary) located?

A

/opt/splunk/bin

54
Q

What is the default port to access the splunk web interface?

A

8000

55
Q

During the ACT stage of the OODA loop, what determines the results of the actions taken

A

Metrics and feedback

56
Q

What should the SPLUNK_HOME environment variable contain?

A

/opt/splunk

57
Q

Which stage would the red team observe from the blue team to drive movement

Act
Decide
Orient
Observe

A

Act
Decide

58
Q

Which criteria are used to measure the effectiveness of intelligence:

A

Usability
Timeliness
Accuracy

59
Q

Who created the 5 rings

A

Colonel John Warden

60
Q

Which ring of the 5 rings houses the electrical grid?

A

Infrastructure

61
Q

When intelligence is provided early, what does this prevent from occurring?

A

Threat actions

62
Q

What is the business equivalent of the population in warden’s 5 rings

Petroleum
Employees
Users
Staff

A

Employees
Users
Staff

63
Q

When must intelligence flow to the decision-maker in an operation?

A

During
Before
After

64
Q

Judging intelligence as successful requires which criteria?

A

Accuracy
Utilization
Timeliness
Actionability
Relevance

65
Q

Sun tzu said to match your strengths against their strengths, true or false?

A

False

66
Q

Who defines the level of precision required?

A

Customer

67
Q

Who can limit the level of precision possible?

A

Collector

68
Q

Parallel attacks are sequential attacks, true or false?

A

False

69
Q

The final criterion requiring the intelligence to be shared and disseminated in the format requested by the decision makers is called

A

Tailored

70
Q

What are the intangible elements of the domains of conflict in the information environment?

A

Information and cognitive

71
Q

According to the strategist, sun tzu, who do we need to know for our victory to not be endangered?

A

Know the enemy and know yourself

72
Q

Where in the sun tzu quote does the mission drive direction of effort and the allocation of resources?

A

Know yourself

73
Q

Of the motivations for intelligence, which of the following questions is NOT To be considered:
What authority do you have to collect the data and information?
How much time does it take to conduct the intelligence?
How is that data gathered?
What is done to and with the data?

A

How much time does it take to conduct the intelligence?

74
Q

What are the three components of understanding the role of threat intelligence?

A

Operating environment
Threats
Mission

75
Q

In the planning and direction stage, information consumers should NOT :

A

Dictate particular source or collection method

76
Q

In understanding the role of threat intelligence, the mission defined what exactly?

A

The equipment
The things you do
The personnel

77
Q

Which is not a transform in maltego?
Network CIDR
Email addresses from domain
Person from domain
Explore historical snapshots

A

Network CIDR

78
Q

When understanding the enemy’s role in threat intelligence, what type of field do these threats operate within?

A

Rapidly-changing

79
Q

True or false
Results from the transform are added as parent entities to the domain entity in maltego

A

False

80
Q

What term describes the space you operate in threat intelligence

A

Operating environment

81
Q

Which area of the mission/threat/operating environment do threat actors act within the role of threat intelligence?

A

The area of intersection between threat and operating environment

82
Q

The IP address in maltegobcan be found by running the “To IP Address [DNS]” transform from which of the following:
Email addresses
Domain entities
DNS entities
Phone numbers

A

DNS entities

83
Q

Why is the intersection of all three areas, mission/threat/operating environment, our point of greatest concern?

A

These are the threats relevant to the mission and that are active in the operating areas.

84
Q

What does strategy provide that enables the cyber security engineering topics to be cohesive?

A

The why
Framework
Purpose

85
Q

When defining a threat, what is the additional component that makes a threat more dangerous to the organization?

A

Knowledge

86
Q

Understanding the operating environment is one purpose of intelligence. True or false?

A

True

87
Q

Reducing risk is not the purpose of intelligence. True or false

A

False

88
Q

What does intelligence at the strategic level require more than tactical?

A

More analysis

89
Q

In the intelligence process cycle, how do all phases function after the cycle has begun?

A

Continuously

90
Q

In a healthy intelligence cycle, what occurs between every phase of the cycle?

A

Evaluation and feedback

91
Q

True or false
Karl Popper states: scientists must be willing to stand firm in their beliefs if the evidence shows otherwise.

A

False

92
Q

A conjectured relationship between two phenomena can be:
Causal
Non causal

A

Causal : a directly causes b
Non causal: a and b are caused by c ; hence a and b are correlated

93
Q

What are the steps in order to construct a theory: 4 steps

A

Induce
Deduce
Test
Revise

94
Q

What are the 3 curves used in models

A

Bell
S
Exponential

95
Q

What are the 3 curves used in models

A

Bell
S
Exponential

96
Q

What is a model

A

A replica or representation of an object idea or actual system

97
Q

What is data decomposition

A

Breaking down the problem or issue into its component parts so that each part can be considered separately

98
Q

What criteria for data evaluation are used to answer the question: what is the reason the data was made available?

A

Objectivity

99
Q

Name the 4 core features in the diamond model overview

A

Adversary
Victim
Infrastructure
Capabilities

100
Q

When using analytical thinking, what qualitative analysis would be used for unknown data?

A

Challenges and redrawing techniques
Structured analysis
Imagination techniques
Diagnostic techniques

101
Q

When using analytical thinking, what type of quantitative analysis tools can we employ when we have known data?

A

Empirical analysis
Visualization techniques
Data-based computer tools

102
Q

Match
Based on understanding of cases or objects by a researcher (qualitative/quantitative)
Based on statistical comparisons of the cases being studied (qualitative/quantitative)
Answers the questions, why, how or what happened (qualitative/quantitative)
Answers the questions how many, how much and how often (qualitative/quantitative)

A

Qualitative
Quantitative
Qualitative
Quantitative

103
Q

Analysis should be scientific and based on

A

Evidence

104
Q

True or false
Intuition is also very prone to be anti-biased

A

False