Randomness Flashcards

1
Q

Acronym SIEM stands for? And does what?

A

Security Information and Event Managemt

Protects Log Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC Address to IP Address resolution?

a. DNS
b. LDAP
c. ARP
d. SSL

A

c. ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NSLookup is a command line command used on what system?

A

Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DIG is a command line command used of what system?

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The path a packet travels from the source to the destination is called?

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol is used when you conduct a PING or TRACEROUTE?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port does DNS use?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What port does SNMP use?

A

161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What port does TFTP use?

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you are physically driving around looking for unsecured/open access points you are?

A

Wardriving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Most widely use VPN tunnel in the world?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

________ means to hide.

A

Obfuscate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What port is the Common Unix Printing Service (Printing over the Internet)?

A

631

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of virus only attacks Microsoft Office products?

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If you want to get a packet through an IDS without seeing inside the packet you?

A

Encrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you want to get a packet through an IDS you need to?

A

Fragment it

17
Q

FIN-PSH-URG TCP flags are what type of attack?

A

XMAS Attack

18
Q

Payment Card Industry (PCI) -DSS deals with what type of systems?

A

Electronic Payment systems / Point of Sales

19
Q

A vulnerability scanner that is used extensively to identify potential vulnerabilities in web application and web servers.

A

Nikto

20
Q

Input Validation is used to mitigate againts?

A

SQL Injections

21
Q

What port is used for SMB (FileShare, CIPS)?

A

445

22
Q

What is port 631 used for?

A

Common Unix Print Service

23
Q

“Validate and escape all information sent to a server” also means?

A

Input Validation

24
Q

Risks = Threats x Vulnerabilities is referred to as?

A

The Risk Equation