Sec + Flashcards
Which term describes when data is in some sort of persistent storage media?
Data at rest
Describe Data in transit.
Same as data in motion, It is when data is transmitted over a network. Examples include website traffic and remote access traffic, and data being synchronized between cloud repositories.
Describe Data in use
When data is present in volatile memory sources. Examples include documents open in a word processing application, database data that is currently being modified, and event logs being generated while an operating system is running.
What is Data Sovereignty?
Refers to legal implications of data stores in other countries.
What is a cold site?
A cold site is an alternate location where a network can be rebuilt after a disaster has occurred. A cold site can take some time to implement, as systems and assets (including data) are not readily configured and available for full use.
What is a warm site?
A warm site is a dormant alternate location, or a location that performs noncritical functions under normal conditions, but can be rapidly converted to a main operations site with minimal effort.
What is a hot site?
A hot site is a fully configured alternate network that can be quickly brought online after a disaster. With a hot site, systems and data are usually up-to-date.
What is a failover?
Refers to system redundancy. With a failover configuration, an additional device is configured to function when the primary configuration fails.
What is Standard Naming Convention?
A standard naming convention is a defined set of rules for choosing the character sequence to be used for identification in coding. A standard naming convention reduces the effort in code reviews and programming error.
What is code of obfuscation?
Code obfuscation is the practice of camouflaging code by replacing numbers with expressions and renaming variables to make the code unreadable
What is Baselining?
Baselining is a method for analyzing computer network performance. The method is marked by comparing current performance to a historical metric, or “baseline”.
Baselining is the practice of applying changes to the master baseline of code in a continuous pattern. Developers apply the changes regularly to build the application.
Define Code Reuse?
Code reuse is the practice of reusing tested and approved code for development to save time and prevent the introduction of errors in new coding efforts.
What is a logic bomb?
A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files, should they ever be terminated from the company.
A logic bomb is a malicious program or script set to run under particular circumstances or in response to a defined event, such as the admin’s account becoming disabled.
What is a RAT? (Remote Access Trojan)
A Remote Access Trojan functions as a backdoor and allows the attacker to access the PC, upload files, and install software on it.
What is a rootkit?
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of “root” and the word “kit”.
A rootkit is a backdoor malware that changes core system files and programming interfaces so that local shell processes no longer reveal their presence.
What is spyware?
Spyware is a program that monitors user activity and sends the information to someone else, with or without the user’s knowledge. One spyware technique is to spawn browser pop-up windows, as well as modify DNS queries attempting to direct the user to other websites, often of dubious provenance.
What is crypto-malware?
Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, held by the attacker.
While ransomware primarily demand ransom in the form of Bitcoin, the first cryptocurrency— to ‘unblock’ access to system/files— a crypto malware is designed to mine cryptocurrencies from systems without the users’ knowledge
Which of the following attacks do security professionals expose themselves to, if they do not salt passwords with a random value?
A rainbow table attack -Passwords not “salted” with a random value make the ciphertext vulnerable to rainbow table attacks. A rainbow table attack is a password attack that allows an attacker to use a set of plaintext passwords and their hashes to crack passwords.
What is a dictionary attack?
In a dictionary attack, software enumerates values in a dictionary wordlist. Enforcing password complexity makes passwords difficult to guess and compromise. Varying the characters in the password makes it more resistant to these attacks
What can an attacker do to acquire a duplicate of another user’s smart card?
Clone it - Card cloning refers to making one or more copies of an existing card. An attacker can physically duplicate a lost or stolen card with no cryptographic protections.
What is a Potentially unwanted program (PUP)?
Potentially unwanted programs (PUP) or potentially unwanted applications (PUA) is software installed alongside a package or from a computer store that the user did not request.
What is a downgrade attack?
A downgrade attack is a form of cyber attack in which an attacker forces a network channel to switch to an unprotected or less secure data transmission.
A downgrade attack can facilitate an On-path attack by requesting that the server use a lower specification protocol with weaker ciphers and key lengths.
What is a Lightweight Directory Access Protocol (LDAP)?
A lightweight directory access protocol (LDAP) injection occurs when an attacker exploits a client’s unauthenticated access to submit LDAP queries that could create or delete accounts, even change authorizations and privileges. LDAP uses port 389.
What is XML injection?
An extensible markup language (XML) injection attack occurs when submitted XML data takes advantage of spoofing, request forgery, and injection of arbitrary code. The XML had no encryption or input validation checks.