Random Stuff I need to learn Flashcards

1
Q

PAP

A

Password Authentication Protocol (PAP) - Username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP & UDP

A

Transmission Control Protocol & User Datagram Protocol
Layer 4

Enables different types of data transmission from a network source to the destination. TCP is more reliable, while UDP prioritizes speed and efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ICMP

A

Internet Control Message Protocol

Error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets

Reports on network congestion and reachability. Utilities such as ping and tracert use ICMP as their transport mechanism

NOT a transport protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Server Clusters

A

Server clusters include two or more servers working together to offer services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NAT

A

Network Address Translation

Used in routers. Maps multiple local private addresses to a public one before transferring the information

Translate a set of IP addresses to another set of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RAID 0

A

Provides data STRIPING across multiple disks to increase performance. Focused on speed and performance. Atleast 2 hard drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAID 1

A

Provides redundancy by MIRRORING the data identically to 2 hard drives. Atleast 2 hard drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAID 5

A

Provides redundancy by STRIPING data and PARITY data across the disk drives. Requires at least of 3 disk drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAID 6

A

Provides redundancy by STRIPING and DOUBLE PARITY data across the disk drives. Requires at least 4 hard disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAID 10

A

Creates a striped RAID of two mirrored RAIDs (combines RAID 1 & RAID 0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bluejacking

A

The sending of unsolicited messages to Bluetooth enabled devices (sends info)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bluesnarfing

A

Unauthorized access of info from a wireless device over Bluetooth (takes info)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XSS/CSS

A

Cross-Site Scripting

When malicious code is inserted into the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

XSRF/CSRF

A

Cross-Site Reference Forgery

When an attacker forces a user to execute actions on a web server that they are already authenticated (logged into)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Daemons

A

Computer program that runs as a background process, rather than being under the direct control of an interactive user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SCADA

A

Supervisory Control and Data Acquisition - Type of ICS (Industrial Control System) that manages large-scale, multi-site devices and equipment spread over a geographic region.

Commonly used in manufacturing companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SNMP

A

Simple Network Management Protocol - A TCP protocol that aids in monitoring network attached devices and computers

Provides info about memory & CPU usage and other device details. Port 161 UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Sovereignty

A

The legal concept that says data is subject to the laws of the country where it is stored

Applicable laws and regulations based on the physical location of digital data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Legal Hold

A

Process designed to preserve all relevant information when litigation (lawsuit) is reasonably expected to occur

The legally required implementation of evidence preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Chain of Custody

A

Requires evidence to be gathered in a legal manner, documented, and securely stored at all time

The process of handling evidence so that it is admissible in court. Evidence should be labeled, locked away when not in use, and if it is transferred to someone else it needs to be documented who and when.

Chain of custody forms list every person who’s worked with or who has touched the evidence that is a part of an investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PKI

A

Public Key Infrastructure

A group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. Allows users to communicate securely without personally knowing one another

Governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications

A hierarchy of digital security certificates

Entire system of hardware, software, policies, procedures, and people that is based on asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Logic Bomb

A

Malicious code that is embedded into a system and may only be activated when certain conditions are met, like timers or system events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Smash the Stack

A

Occurs when an attacker fills up the buffer with NOP so that the return address may hit a NOP and continue on until it finds the attacker’s code to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RPs

A

Provide services to members of a federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What happens during reconnaissance?

A

Testers will look for info about an organization such as domain names and email addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Retinal scan

A

Takes several photos of the back of your eye, visualizing your retina, optic disc, and blood vessels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Iris Scan

A

Rely on the matching of patterns on the surface of the eye using near-infrared imaging, and is less intrusive than retinal scanning (the subject can continue to wear glasses, for instance) and much quicker

Much less likely to be affected by diseases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

IMAP

A

Internet Message Access Protocol (IMAP) - TCP/IP application protocol that provides a means for a client to ACCESS EMAIL messages stored in a mailbox on a remote server using TCP

Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

User and entity behavior analytics (UEBA)

A

System that can provide automated identification of suspicious activity by user accounts and computer hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cognitive Password

A

Form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know, to verify their identity.

If you post a lot of personal info about yourself online, this password type can easily be bypassed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DaaS/VDI

A

Desktop as a Service - provides a full virtualized desktop environment from within a cloud-based service. Also known as VDI (Virtualized Desktop Infrastructure)

Virtualization implementation that separates the personal computing environment from a user’s physical computer

*ShadowPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Pharming

A

Attack intended to redirect a website’s traffic to another, fake site by installing a malicious program on the computer.

Can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software

Occurs when an attacker attempts to obtain personal or private information through domain spoofing or poisoning a DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Rogue anti-virus

A

Form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

OCSP

A

Status of certificates…provides validity such as good, revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Virtual Switch

A

Software application that allows communication between virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Enumeration

A

Process of extracting usernames, machine names, network resources, shares, and services from a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CSR (certificate signing request)

A

What is submitted to the CA (certificate authority) to request a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

ARP

A

Address Resolution Protocol
Layer 2 protocol used to map MAC addresses to IP addresses

Procedure for mapping a dynamic IP address to a permanent physical machine address in a local area network (LAN)

Protocol that enables network communications to reach a specific device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SIP traffic

A

Used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications

Voice and video..VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In Linux, what command shows the first 10 entries in a text-based application log file?

A

head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

In Linux, what command shows the last 10 entries in a text-based application log file?

A

tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Implicit Deny

A

Traffic is denied the ability to enter or leave the network because there’s no specific rule that allows it

All access to a resource should be denied by default and only allowed when it’s explicitly stated

When a user or group are not granted a specific permission in the security settings of an object, but they are not explicitly denied either

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Explicit Deny

A

Traffic is denied the ability to enter or leave the network because there’s an ACL rule the specifically denies it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Smurf attack

A

Uses a single ping with a spoofed source address sent to the broadcast address of a network. This causes every device within the network to receive a single ping, which appears to come from the device with the spoofed source address.

Form of DDoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Explicit Allow

A

Traffic is allowed to enter or leave the network because there’s an ACL rule that specifically allows it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Security Logs

A

Shows auditing entries related to activities such as logon attempts or file access

Logs the events such as successful and unsuccessful user logons to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Application Logs

A

Logs the events for the operating system and third-party applications

File that contains info about events that have occurred within a software application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Event Log

A

File containing records of event data

Records events from various sources and stores them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Access Log

A

Contains detailed information about each request made to the serve

Contains a list of each of the files accessed on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Steganography

A

Technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

IaaS

A

Infrastructure as a Service

Model that provides the user with the hardware needed to get up and running, the end user is responsible for the operating system, the application, and any ongoing maintenance tasks

3rd party provides you with infrastructure services, like storage and virtualization, as you need them, via a cloud, through the internet

Allow organizations to manage their business resources — such as their network, servers, and data storage — on the cloud

Focused on moving your servers and computers into the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

PaaS

A

Provider hosts the hardware and software on its own infrastructure and delivers this platform to the user as an integrated solution, solution stack, or service through an internet connection.

Provides that platform for software developers to create, allowing them to concentrate on the software itself instead of any external issues

Allow businesses/developers to host, build, and deploy application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Saas

A

Software as a Service

Provides an entire application that is managed by a provider, via a web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

DHCP

A

Dynamic Host Configuration Protocol

Used to dynamically assign IP addresses

Assigns IP addresses and other configurations to devices when they connect to a network

Port 67

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

FACT: Wifi Channels can be changed

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Hashes vs Encryption

A

Hashes provide assurances of messages authenticity and integrity. Hashes ensure original dada hasn’t been changed

Encryption provides confidentiality not integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Blowfish

A

Symmetric. Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

RC4

A

Symmetric. Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

MD5

A

Hashing algorithm, neither symmetric or asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

RSA

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Wireshark

A

Open source packet capturing and analysis tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

chmod

A

Linux command…used to manipulate system permissions

Change/modify file system permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

nmap

A

Network reconnaissance and assessment tool used to scan hosts for open network service port

Network scanner that discovers hosts and services on a computer network by sending packets and analyzing the responses

Port scanner commonly used for host discovery and service identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

nslookup

A

Name server lookup. Used to troubleshoot DNS problems. Name resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Proxy Server…4 types?

A

A device that acts as a middle man between a device and a remote server.

4 types: IP proxy, caching proxy, internet content filter & web security gateway

Helps prevent an attacker from invading a private network and is one of several tools used to build a firewall

A system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network

Process requests on another network device’s behalf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Identity federation

A

Uses security tokens generated by a trusted identity source to allow access to resources such as websites

Single identity is created for a user and shared with all of the organizations in a federation

System of trust between two parties for the purpose of authenticating users and conveying information needed to authorize their access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Quantitative Risk Analysis

A

Identifies assets and risks and uses calculations such as ALE (annual loss expectancy) to prioritize and budget funds to manage these risks.

Uses numerical and monetary values to calculate risk

Requires detailed financial data, complex calculations and is time consuming.

Uses exact numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Qualitive Risk Analysis

A

One that uses judgment to determine potential losses if an incident occurs. Values cannot be ascertained with precision. They can include damages to reputation or brand image

Subjective and requires expertise on systems and infrastructure. Cheaper and faster

Categorizes things based on the likelihood and impact of a given incident using non-numerical terms, such as high, medium, and low.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

ALE

A

Annual Lost Expectancy - Expected cost of a realized threat of a year.
ALE = SLE x ARO

70
Q

ARO

A

Annual Rate of Occurrence - The likelihood of a failure in a year

71
Q

Kerberos

A

Authentication protocol that grants tickets to authenticated entities. Port 88

Ticket Based Authentication

72
Q

CHAP

A

Challenge Handshake Authentication Protocol - Uses shared secret (typically user credentials) known by both ends of a connection. The secret is hashed

73
Q

SOC 2 Type 1

A

System & Organization Controls reporting (Auditing)

Audits design and implementation of controls at a single point in time. The auditor will review evidence from your systems as it exists at a particular “moment in time”

Assesses the design of security processes at a specific point in time

74
Q

SOC 2 Type 2

A

System & Organization Controls reporting (Auditing)

Documents operation efficiency of IT systems within a specific time frame

Assesses the design of security processes over time…(6 months)

75
Q

Public Keys

A

Often used to encrypt user files directly…or to generate file encryption keys, then encrypt files. Keys can be stored in a protected file on a disk or on a smart card

Can be used to encrypt data and verify digital signatures.

76
Q

Private Keys

A

Can be used to decrypt data and create digital signatures.

77
Q

Session Keys

A

Generally symmetric, the same key is used for encryption and decryption

78
Q

NIC

A

Network Interface Cards - Hardware component that allows computer to connect to a network

79
Q

Full Backup

A

Archives all data even if it hasn’t changes since the last full backup. Requires more storage and time to perform but the restoration is the quickest since its a single backup set

80
Q

Differential Backup

A

Backs up anything that has changed since the last full backup

Minimize backup time but take longer to restore than full backups

81
Q

Incremental Backup

A

Starts with a full backup. Backs up anything that has changed since the last full or incremental backup

Minimize backup time but take longer to restore than full backups

82
Q

SYN flood

A

Variant of a Denial of Service (DOS) attack where the attacker initiates multiple TCP sessions but never completes the 3-way handshake. This uses up resources on the server since it cannot complete the handshake and keeps resources reserved for the attacker’s computer while it awaits the handshake’s completion

83
Q

What are the 7 Layers of the OSI Model?

A

Conceptual framework used to describe the functions of a networking system

Bottom 1. Physical Please
2. Data Link Do
3. Network Not
4. Transport Throw
5. Session Sausage
6. Presentation Pizza
Top 7. Application Away

All People Seem To Need Data Processing

84
Q

Host Base firewalls

A

Monitors traffic coming into and leaving a computer

Protects a single computer form unwanted internet traffic

85
Q

Linux cat command

A

Used to view contents of text files

Used to concatenate (join) files and print on the standard output
catfile1.txt

86
Q

Linux chmod command

A

Used to manipulate Linux file system permissions

Used to change/modify file system permissions

87
Q

Linux grep commmand

A

Line filtering.
Searches a file for a particular pattern of characters, and displays all lines that contain that pattern

Used to print lines that match patterns.

88
Q

head command

A

Used to display beginning lines from a text file

89
Q

IP header

A

Header information at the beginning of an Internet Protocol (IP) packet

Contains the source IP address and the TTL (time-to-live) value

90
Q

BTU value

A

British Thermal Units

Measures thermal energy (heat).

Your server room AC must be able to displace the BTUs generated by your computing equipment; otherwise, the server room will be much too warm for your equipment.

91
Q

BitLocker

A

Windows software that allows you to encrypt files

92
Q

tcpdump

A

Linux command line tool

Used to capture network traffic

Command line tool that allows you to capture and analyze network traffic going through your system

93
Q

P2P Network

A

Peer-to-Peer Network

Network created whenever two or more devices/computers are connected and share the same resources

Vulnerable to Trojans and spyware

94
Q

dd command

A

Linux command that can be used to create an exact copy of a disk volume, while leaving the original disk volume intact

Command line utility used to copy disk images using a bit by bit copying process

95
Q

nslookup

A

Used to test DNS server connectivity and name resolution

96
Q

SMTP

A

Used to send email over internet
Port 25

97
Q

SSID

A

Service Set Identifier.
The name of a wireless network

*When not broadcasted the wireless network is not visible when you’re scanning for wireless networks

98
Q

Business Impact Analysis (BIA)

A

Studies the impact that an incident presents to a business.

99
Q

PowerShell

A

A cross-platform task automation and configuration management framework

Uses a verb-noun type of syntax and is used by network administrators to manage computers

“Get-Service | Where{$_.status –eq “Running”}”

taskautomation and configuration management program

100
Q

SNMP

A

Simple Network Management Protocol
Industry standard for managing and monitoring printers, servers, workstations, routers, switches, IP phones, and so on

A TCP protocol that aids in monitoring network attached devices and computers

Port 161

101
Q

SNMPv3

A

Simple Network Management Protocol version 3

Provides Encryption and interity functionality

Exchanges management data…port 161

102
Q

SMTP

A

Simple Mail Transfer Protocol - transmits Internet e-mail messages to other SMTP hosts and can be configured to encrypt the transmission.

Port 25

103
Q

Fuzzing

A

Sample/random data is passed to the application to test its security and functionality

104
Q

A5

A

Symmetric. Stream Cipher

105
Q

Layer 1 (OSI Model)

A

Physical layer -Responsible for the physical cable or wireless connection between network nodes

106
Q

Layer 2 (OSI Model)

A

Data Link Layer - provides node-to-node data transfer (between two directly connected nodes), and also handles error correction from the physical layer.

Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. In the networking world, most switches operate at Layer 2

107
Q

Layer 3 (OSI Model)

A

Network Layer - Responsible for packet forwarding, including routing through different routers. You might know that your Boston computer wants to connect to a server in California, but there are millions of different paths to take. Routers at this layer help do this efficiently

Deals with IP addresses and routing

108
Q

Layer 4 (OSI Model)

A

Transfer layer -deals with the coordination of the data transfer between end systems and hosts. How much data to send, at what rate, where it goes, etc

Deals with TCP and UDP details including port numbers,

109
Q

Layer 5 (OSI Model)

A

Session layer - creates communication channels, called sessions, between devices. Responsible for opening sessions, ensuring they remain open and functional while data is being transferred, and closing them when communication ends

When 2 computers or other networked devices need to speak with one another, a session needs to be created. Functions at this layer involve setup, coordination (how long should a system wait for a response) and termination between the applications at each end of the session

110
Q

Layer 6 (OSI Model)

A

Presentation layer - prepares data for the application layer. Defines how 2 devices should encode, encrypt, and compress data so it is received correctly on the other end

Presents data for the application or the network.
Example of this is encryption and decryption of data for secure transmission

111
Q

Layer 7 (OSI Model)

A

Application layer - specific functionality, such as a web browser connecting to a specific URL.

Layer that is the “closest to the end user”. It receives info directly from users and displays incoming data to the user.

Used by end-user software such as web browsers and email clients. Provides protocols that allow software to send and receive info and present meaningful data to users.

Application layer protocols are the HTTP, FTP, POP, SMTP, & DNS

112
Q

Symmetric Encryption

A

When the same key is used to encrypt and decrypt

Shared key

113
Q

Asymmetric Encryption

A

Uses one key to encrypt and a second key to decrypt.

2 Seperate Keys

114
Q

DLP

A

Data Loss Prevention - Monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data.
Can used to help identify insider threats

Can ensure blaock and monitor data transfers to unauthorized locations. Ensures that private data stays private

115
Q

TLS

A

Transport Layer Security - Network security protocol commonly used to secure web application connections using HTTPS

Cryptographic protocol designed to provide communications security over a computer network

Port 443

116
Q

Exploit

A

Takes advantage of a vulnerability

117
Q

DRP

A

Disaster Recovery Plan

118
Q

DHCP

A

Dynamic Host Configuration Protocol - Used to dynamically assign IP addresses. It will also assign subnet masks, default gateways, etc.

Automatically provides and assigns IP addresses, default gateways and other network parameters to client devices

Port 67

119
Q

Host-based firewalls

A

Firewall on a host computer. Monitors traffic going through the host network

Can protect the remote users’ computers from network attacks originating from their internet connection

120
Q

Attack Surface

A

An aspect of your software application that’s vulnerable for an attacker to exploit

Ex. Open port, or a running network service

121
Q

Virtual Private Cloud (VPC)

A

Can run a public facing application but still maintain a private back end with servers that aren’t publicly accessible

122
Q

Network Access Translation (NAT)

A

Designed for IP address conservation. It enables private IP networks that use unregistered IP addresses to connect to the Internet.

Used in routers to translate private internal IP addresses to routable public addresses

Conserves the number of public addresses used within an organization

123
Q

Runbook

A

Part of SOAR. Set of rules that can be largely automated

124
Q

Playbook

A

Part of SOAR. Lists step-by-step actions that need to occur within the SOAR process. Actions are typically performed by humans

125
Q

SSH

A

Secure Shell, Port 22. Provides encrypted remote access channel to a host system

Encrypted Tunnel

126
Q

DNS

A

Domain Name Service, Port 53.

127
Q

HTTPS

A

Provides encrypted web connection to the router

Secure web communication using SSL/TLS

Port 443

128
Q

CIS Controls

A

Center for Internet Security. AKA Top 20 controls. Top 20 control groups

129
Q

Job Rotation

A

Ensures that no employee retains the same amount of access control for a responsibility for more than a given period

130
Q

Serparation of Duties

A

Policy that ensures that one single individual isn’t tasked with high-security and high-risk responsibilities.

Critical responsibilities are separated between several users to prevent corruption and errors.

131
Q

IPFIX

A

IP Flow Information Export

Common representation of flow data and a standard means of communicating, as required for transmitting traffic flow information over a network for collection

Groups traffic into flows to then send on to a centralized collection point. IPFIX is based on NetFlow v9.

132
Q

Link-Level Security

A

Authenticates the actual communications link before data transmission begins. Data encryption can also be performed in this mode after the link is authenticated.

133
Q

CRL

A

Certificate Revocation Lists - Where revoked certificate serial numbers are stored

134
Q

Embedded Systems

A

Include gaming systems, printers, appliances, in-vehicle systems, medical devices, cameras, home automation, and HVAC (heating, ventilating, and air conditioning) controls that are network enabled, and sometimes Internet connected, for remote access

Combination of computer hardware and software designed for a specific function. Embedded systems may also function within a larger system

135
Q

Blockchains

A

Publicly accessible ledgers that record online transactions, based on peer-to-peer technology.

A party initiates a block, which is then verified by all the distributed systems and added to the chain (or rejected if not verified). Difficult to cheat the system. Generally, the larger the blockchain, the safer

136
Q

Protocol analyzer

A

Sometimes called sniffers…capture network traffic allowing administrators to view and analyze individual packets

to examine the network packets sent from the web server to the database server. Through detailed analysis, you can discover which of the requests is sending malformed data and thus causing your database server to crash.

137
Q

RTO

A

Recovery Time Objectives - Maximum amount of time that is considered tolerable for a service/function to be unavailable

Represents the amount of time it takes to identify that there is a problem and then perform recovery the

Timeframe following a disaster that an individual IT system may remain offline

138
Q

RPO

A

Recovery Point Objectives - Maximum acceptable amount of lost data because of an outage

The amount of data loss that a system can sustain, measured in time.

*An RPO of 24 hours means that the data can be recovered (from a backup copy) to a point not more than 24 hours before the database was infected

139
Q

MTBF

A

Mean Time Between Failures - Average length of time a specific device is expected to work until it fails

140
Q

MTTR

A

Mean Time To Repair - The average length of time from the moment a component fails until it is repaired

141
Q

Vitualization

A

The creation of a virtual version of something, such as an operating system (OS), a server, a storage device or network resources. Uses software that simulates hardware functionality to create a virtual system

*You can run different websites on a separate virtual machine (VM) running on the same hardware platform. You can run several VMs on one system, and each VM is isolated from the others, thus preventing security issues with one website from affecting other websites

142
Q

Cain and Abel (AKA Cain)

A

Password cracking tool

143
Q

Ping/Ping Sweep

A

Ping command is used to ping a single host device to identify its existence…Ping Sweep helps to ping multiple IP addresses simultaneously

Can show which network clients are active and responding to requests

144
Q

SPF

A

Sender Policy Framework (SPF) - an email authentication method designed to detect forging sender addresses during email delivery

145
Q

IP Fragmentation

A

Common form of DDos Attacks

146
Q

Microsoft Endpoint Configuration Manager (MECM)

A

Microsoft Endpoint Configuration Manager (MECM) - provides remote control patch management, software distribution, operating system deployment, network access protection, and hardward/software inventory.

147
Q

SYN flood attack (DoS)

A

Repeatedly sends initial connection request (SYN) packets…the attacker is able to overwhelm all available ports on a targeted server machine, causing the targeted device to be overwhelmed

148
Q

Reverse Proxy

A

Server that sits in front of one or more web servers intercepting requests from clients

Sits in front of an origin server and ensures that no client ever communicates directly with that origin server

Accepts a request from a client, forwards the request to another one of many other servers, and returns the results from the server that actually processed the request to the client as if the proxy server had processed the request itself.

Reverse Proxy: //www.cloudflare.com/img/learning/cdn/glossary/reverse-proxy/reverse-proxy-flow.svg

Proxy (Forward): https://www.cloudflare.com/img/learning/cdn/glossary/reverse-proxy/forward-proxy-flow.svg

149
Q

Web Proxy (Forward Proxy)

A

Server that sits in front of a group of client machines. When those computers make requests to sites and services on the Internet, the proxy server intercepts those requests and then communicates with web servers on behalf of those clients, like a middleman

Sits in front of a user and acts as a mediator between users and the web servers they access. User’s request goes through the forward proxy first and then reaches the web page. Once the data from the internet is retrieved, it is sent to the proxy server, redirecting it back to the requester. *From the perspective of the internet server, the request is made by the proxy server itself and not the user

Reverse Proxy: //www.cloudflare.com/img/learning/cdn/glossary/reverse-proxy/reverse-proxy-flow.svg

Proxy (Forward): https://www.cloudflare.com/img/learning/cdn/glossary/reverse-proxy/forward-proxy-flow.svg

150
Q

FISMA

A

Federal Information Security Management Act - United States federal law that defines a comprehensive framework to protect government information, operations, and assets against natural or human-made threats. FISMA requires that government agencies and other organizations that operate systems on behalf of government agencies comply with security standard

151
Q

Multipartite Virus

A

Virus that combines boot and program viruses. First attaches to the boot sector and system files before attacking other files on the
computer

152
Q

Polymorphic Virus

A

Advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection

Changes PART of its code but retains one part of its code that remains the same to stay undetected

153
Q

Metamorphic Virus

A

Virus that is able to rewrite itself entirely before it attempts to infect a file
(advanced version of polymorphic virus)

Completely re-writes its code so that each newly propagated version of itself no longer matches its previous iteration to remain undetected

154
Q

SAML (Security Assertion Markup Language)

A

Security Assertion Markup Language - An open standard for exchanging authentication and authorization data between parties between an identity provider and a service provider

155
Q

OpenID Connect

A

Simple identity layer on top of the OAuth 2.0 protocol

156
Q

What are the private IP addresses?*

A

Private IP addresses are either 10.x.x.x, 172.16-31.x.x, or 192.168.x.x.

157
Q

Heuristic Analysis

A

Method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild

Detects viruses by examining code for suspicious properties. Designed to spot unknown new viruses and modified versions of existing threats

Determines whether several observed data points constitute an indicator and whether related indicators make up an incident depending on a good understanding of the relationship between the observed indicators

158
Q

Netflow

A

Flow analysis tool. Does not capture the full packet capture of data as it crosses the network sensor but captures metadata and statistics about the network traffic.

Metadata can highlight trends and patterns in the traffic generated by the malicious user, such as the volume of data sent and received

159
Q

FERPA

A

Family Educational Rights and Privacy Act - Requires educational institutions implement security and privacy controls for student educational records

School, Students

160
Q

SOX

A

Sarbanes-Oxley Act - Affects publicly traded U.S. corporations and requires certain accounting methods and financial reporting requirements

Dictates requirements for storing and retaining documents relating to an organization’s financial and business operations, including the type of documents to be stored and their retention periods

161
Q

Banner Grabbing

A

Conducted by actively connecting to the server using telnet or netcat and collecting the web server’s response. Banner usually contains the server’s operating system and the version number of the service being run.

162
Q

Purging a device vs Clearing a device?

A

Purging includes methods that eliminate information from being feasibly recovered even in a lab environment. Ex: performing a cryptographic erasure (CE) would sanitize and purge the drives’ data without harming the drives themselves.

Clearing drives leaves the possibility that some tools would allow data recovery

163
Q

Hping

A

Assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command but offered far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation.

Hping is useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities.

164
Q

VLAN

A

Virtual Land Area Network - logically separate network that is created using switching technology

Subnetwork that can group together collections of devices on separate physical local area networks (LANs)

Enables a group of devices available in multiple networks to be combined into one logical network

*Typically need a router

165
Q

GPO

A

Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.

Efficient way to deploy system configuration settings across many Window’s devices

166
Q

APTs

A

Advanced Persistant Threats - highly sophisticated nation-state threat actor that quietly gathers information from compromised systems and can lay in waiting for several months during an ongoing attack

167
Q

Dynamic Code Analysis

A

Involves running code and examining the outcome, which also entails testing possible execution paths of the code

The process of testing and evaluating a program — while software is running

168
Q

PAP

A

Password Authentication Protocol (PAP) - Username and password

169
Q

What happens during recc

A
170
Q

What happens during recc

A
171
Q

What happens during recc

A
172
Q

What happens during recc

A