Security Flashcards

1
Q

CIA triad

A

Confidentiality like encryption
Integrity like hashing
Availability like uptime or redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Non-compliant System

A

System that is not compliant with the configuration baseline of what is approved by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Configuration baseline

A

set of recommendations for deploying a computer in a hardened configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unprotected System

A

system not protected by any antivirus or firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unpatched System

A

system without patches or updates applied even though they are available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some Windows releases that are EOL as of 2023?

A

Windows XP
Windows Vista
Windows 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bring Your Own Device (BYOD)

A

Use of personal devices in an office environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero-day Exploit

A

unknown exploit that exposes previously unknown vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denial of Service (DOS)

A

attack that attempts to make a computer or server’s resources unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Flood Attack

A

type of DoS that attempts to send more packets to a server or host than it can handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ping Flood

A

Flood attack that happens when too many pings (ICMP echo) are being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SYN Flood

A

Attacker initiates multiple TCP sessions but never completes the three-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Permanent Denial of Service (PDoS)

A

attack that exploits a security flaw to permanently break a networking device by reflashing its firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fork Bomb

A

attack that creates a large number of processes to use up the available processing power of a computer. It is not considered a “worm” because it does not infect the programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Distributed Denial of Service (DDoS)

A

uses lots of machines to attack a server to create a DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS Amplification

A

the attacker typically uses a botnet or a group of compromised computers to send a large number of DNS queries to open DNS resolvers. The source IP address of these queries is spoofed on the hackers machine to make it look like they are coming from the victim’s IP address. When the open DNS resolvers respond to these queries, the response is sent to the spoofed source IP address, which is the victim’s IP address. Because the response is typically much larger than the original query, this can overwhelm the victim’s network and cause a denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Blackhole/Sinkhole

A

identifies attacking IP addresses and routes them to a non-existent server through the null interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Spoofing

A

occurs when an attacker masquerades as another person by falsifying their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ARP Spoofing/”Poisoning”

A

sending fake ARP messages to a local netowkr in order to associate a fake MAC address with a legitimate IP address, thereby intercepting network traffic intended for the legitimate device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

On-Path Attack

A

occurs when an attacker puts themself between the victim and the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Replay

A

occurs when valid data is captured by the attacker and is then repeated immediately, or delayed, and then repeated. an example is capturing someone’s log-in credentials and storing it, and then logging into their account later on in the day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Relay attack

A

when the attacker inserts themself in between the two hosts and intercepts legitimate communication but relaying the information to a C2 or 3rd party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SSL Stripping

A

when an attacker tricks the encryption application into presenting the user with an HTTP connection instead of an HTTPS connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Downgrade Attack

A

when an attacker attempts to have a client or server abandon a higher security mode in favor of a lower security mode by intercepting the communication between two systems that are negotiating the protocol version to be used, and then modifying the negotiation messages to suggest an older and less secure protocol version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SQL injection

A

attack consisting of the insertion or injection of an SQL query via input data from the client to a web application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Injection Attack

A

insertion of additional information or code through data input from a client to an application. Common types are SQL, HTML, XML, LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cross-Site Scripting (XSS)

A

when an attacker embeds malicious scripting commands on a trusted website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Stored/Persistent - XSS attack

A

attacker injects malicious code into a web application that is then stored on the server and served to all users who access the page. Like adding a comment with XSS injection of a JS alert that whenever someone else loads the page, it shows them that alert. Blind XSS is the same but you cannot see it, like adding XSS into a private report comment to an admin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Reflected - XSS attack

A

when an attacker injects malicious code into a website that is then reflected back to the user in a dynamic response, such as a search query or a form submission. The victim’s browser then executes the malicious code, allowing the attacker to steal sensitive information or perform other malicious actions on behalf of the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Document Object Model (DOM) - XSS attack

A

attempt to exploit the victim’s web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How to prevent SQL injections?

A

ensure your website has data validation and sanitizing user inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How to prevent XSS attacks?

A

with output encoding and proper input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Cross-Site Request Forgery (XSRF/CSRF)

A

when an attacker tricks a user into performing an action on a website that they did not intend to perform while they are already authenticated on the website. An example is an attacker sending a malicious link that when clicked, will have the victim go to their online banking app and transfer funds to the attackers account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How to prevent XSRF/CSRF?

A

with tokens, encryption, XML file scanning, and cookie verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Password Analysis Tool

A

Used to test the strength of passwords to ensure password policies are being followed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Password Cracker

A

uses comparative analysis to break passwords and systematically continues guessing until the password is determined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the different types of password cracking methods?

A

password guessing, dictionary attack, brute-force attack, cryptanalysis attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Password Guessing

A

occurs when a weak password is simply figured out by a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Dictionary Attack

A

method where a program attempts to guess the password by using a list of possible passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Brute-Force Attack

A

method where a program attempts to try every possible combination until it cracks the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Cryptanalysis Attack

A

comparing a precomputed encrypted password to a value in a lookup table. Example is a rainbow attack - breaching the target machines password storage of hashes, and using a rainbow table to compare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Insider Threat

A

An employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Logic Bomb

A

specific type of malware that is tied to either a logical event or a specific time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Boot sector - Virus

A

virus that is stored in the first sector of a hard drive and is loaded into memory upon boot. Only targets MBR and is installed via removable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Macro - Virus

A

virus embedded into a document and is executed when the document is opened by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Program - Virus

A

seeks out executables or application files to infect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Multipartite - Virus

A

combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Encryption - Virus

A

uses a cipher to encrypt its contents to avoid any antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Polymorphic - Virus

A

will encrypt its own code in a unique way so that is appears different each time it infects a new file or system in order to evade antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Metamorphic - Virus

A

has the ability to rewrite itself entirely before attempting to infect a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Armored - Virus

A

has a layer of protection to confuse a program or a person who’s trying to analyze it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Hoax Viruses

A

tries to trick a user to infect its own machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Worm

A

malicious software that can replicate itself without any user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Trojan

A

a piece of malicious software that is disguised as a piece of harmless or desirable software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Remote Access Trojan (RAT)

A

provides the attacker with remote control of a victim computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Stealth Viruses

A

a category for any virus protecting itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Virus

A

malicious code that runs on a machine without the user’s knowledge and infects the computer when executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Ransomware

A

malware that restricts access to a victim’s computer system until a ransom is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Spyware

A

malware that secretly gather information about the user without their consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Adware

A

displays advertisements based on your activity. falls into the category of spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Grayware

A

software that isn’t benign nor malicious and tends to behave improperly without serious consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Rootkit

A

software designed to gain administrative level control over a system without detection. commonly installed thru a DLL injection or shim

63
Q

DLL injection

A

malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime

64
Q

Driver Manipulation

A

attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level

65
Q

Botnet

A

a collection of compromised computers under the control of a master node

66
Q

7 steps of removing malware

A
  1. Identify the symptoms of a malware infection
  2. Quarantine/isolate the infected systems
  3. Disable System Restore
  4. Remediate the infected system
  5. Schedule automatic updates and scans
  6. Enable System Restore and create a new restore point
  7. Provide end user security awareness training
67
Q

Phishing

A

a social engineering attack where the malicious actor communicates with the victim from a supposedly reputable source to lure the victim into divulging sensitive information

68
Q

Spearphishing

A

uses the same technology and techniques but is a more targeted version of phishing

69
Q

Whaling - Phishing

A

focused on key executives within an organization or other key leaders, executives, and managers in the company

70
Q

Vishing

A

Occurs when the message is being communicated to the target using the voice functions of a telephone

71
Q

Business Email Compromise (BEC)

A

occurs when an attacker takes over a high-level executive’s email account and orders employees to conduct tasks

72
Q

Pharming

A

tricks users into divulging private information by redirecting a victim to a website controlled by the attacker or penetration tester

73
Q

Tailgating

A

when an attacker attempts to enter a secure portion of a building by following an authorized person into that area, without their knowledge

74
Q

Piggybacking

A

Similar to tailgating, but happens with the knowledge or consent of the employee

75
Q

Shoulder Surfing

A

using direct observation to obtain info from an employee

76
Q

Dumpster Diving

A

actually looking in garbage or recycling bins for personal or confidential information

77
Q

Evil Twin

A

a fraudulent Wi-Fi access point or web server that appears to be legitimate but is set up to eavesdrop on wireless communications

78
Q

Karma Attack

A

exploits the behavior of Wi-Fi devices due to a lack of access point authentication protocols being implemented

79
Q

Preferred Network List (PNL)

A

a list of the SSIDs of any access points the device has previously connected to and will automatically connect to when those networks are in range

80
Q

Captive Portal

A

a web page that the user of a public-access network is obligated to view and interact with before access is granted (sign in with google to access wifi)

81
Q

Personal Firewall

A

software application that protects a single computer form unwanted internet traffic

82
Q

Clean Desk Policy

A

by the end of the day, employees clean their desks and leave nothing out that may be takes as a password or a PIN

83
Q

Physical Controls

A

implemented to increase physical security posture

84
Q

Logical Controls

A

implemented through hardware or software to prevent or restrict access

85
Q

Managerial Controls

A

implemented to manage the organization’s personnel and assets

86
Q

Principle of Least Privilege

A

uses the lowest level of permissions needed to complete a job function

87
Q

Discretionary Access Control (DAC)

A

access control method where access is determined by the owner of the resource

88
Q

Mandatory Access Control (MAC)

A

access control policy where the computer system and administrator decides who gets access

89
Q

Role-based Access Control (RBAC)

A

access method that is combined by the system that focuses on a set of permissions versus an individual’s permissions. Based on roles such as a loan processor group who is allowed to view and modify certain documents.

90
Q

Power User

A

user who is not a normal user and also not a normal administrator

91
Q

Zero-Trust

A

security framework that requires the users to be authenticated, authorized, and validated

92
Q

Time-Based One-Time Password (TOTP)

A

generated by combining a secret key, known only to the user and the authentication system, with the current time. The result is a unique, one-time code that is valid for only a short period of time, typically 30 seconds

93
Q

HMAC-Based One-Time Password (HOTP)

A

2FA authentication mechanism that generates a one-time password based on a secret key and a counter value.

94
Q

In-Band Authentication

A

relies on an identity signal from the same system requesting the user authentication

95
Q

Out-of-Band Authentication

A

uses a separate communication channel to send the OTP or PIN

96
Q

Enterprise Mobility Management (EMM)

A

enables centralized management and control of corporate mobile devices. manages not only mobile devices, but also applications, content, and data in an enterprise environment.

97
Q

Remote Wipe

A

used to send remote commands to a mobile device from a MDM solution to delete its data settings

98
Q

Active Directory (AD)

A

allows to get information from the network about all of your systems, users, and computers

99
Q

Security Group

A

allows to easily assign permissions to a set of users or workstations

100
Q

Organizational Unit (OU)

A

way of dividing the domain into different administrative realms

101
Q

Folder Redirection

A

allows to change the target of a personal folder

102
Q

Pre-Shared Key

A

same encryption key is used by the access point and the client. Only used in symmetric encryption algorithms

103
Q

Wired Equivalent Privacy (WEP)

A

original 802.11 wireless security standard that claims to be as secure as a wired network. Uses IV

104
Q

Wi-Fi Protected Access (WPA)

A

replacement for WEP, which uses TKIP, Message Integrity Check (MIC), and RC4 encryption

105
Q

Wi-Fi Protected Access version 2 (WPA2)

A

802.11i standard to provide better wireless security featuring AES with a 128-bit key, CCMP, and integrity checking

106
Q

Wi-Fi Protected Setup (WPS)

A

automated encryption setup for wireless networks at a push of a button, but is severely flawed and vulnerable. Always disable it

107
Q

Wi-Fi Protected Access 3 (WPA3)

A

Latest and most secure version of wireless network encryption currently available. 192-bit or 128-bit key. Uses AES with GCMP

108
Q

Simultaneous Authentication of Equals (SAE)

A

a secure password-based authentication and password authenticated key agreement that relies on forward secrecy

109
Q

Forward Secrecy

A

assures the session keys will not be compromised even if the long-term secrets used in the session key exchange have been compromised. Generates a new session key for each connection.

110
Q

Remote Authentication Dial-In User Service (RADIUS)

A

cross-platform protocol that authenticates and authorizes users to services, and accounts for their usage

111
Q

Terminal Access Controller Access Control System Plus (TACACS+)

A

Cisco-proprietary protocol that provides separate authentication, authorization, and accounting services

112
Q

Diameter

A

peer-to-peer (meaning Diameter node can communicate with each-other without a central controller) protocol created as a next-generation version of RADIUS

113
Q

Lightweight Directory Access Protocol (LDAP)

A

cross-platform protocol that centralizes info about clients and objects on the network

114
Q

Single Sign-On (SSO)

A

enables users to authenticate once and receive authorizations for multiple services across the network. In an Active Directory environment, Kerberos is used as the authentication protocol for SSO.

115
Q

Kerberos

A

uses symmetric encryption and the Key Distribution Center to conduct authentication and authorization functions

116
Q

What are the steps for Kerberos authentication?

A
  1. The user sends a request to the Authentication Server (AS) for a Ticket-Granting Ticket (TGT).
  2. The AS verifies the user’s identity and sends back a TGT encrypted with a secret key shared between the client and the Kerberos server.
  3. The user sends a request to the Ticket-Granting Server (TGS) with the TGT for a service ticket for a specific resource.
  4. The TGS verifies the TGT’s authenticity and checks the user’s authorization to access the requested resource.
    5 If the TGT is valid and the user is authorized, the TGS creates a service ticket encrypted with a secret key shared between the TGS and the resource server and sends it back to the user.
  5. The user sends the service ticket to the resource server.
  6. The resource server verifies the service ticket by decrypting it with its secret key, and grants access to the requested resource if the ticket is valid.
117
Q

802.1x framework

A

used for port-based authentication on both wired and wireless networks. uses RADIUS or TACACS+

118
Q

Extensible Authentication Protocol (EAP) and what are the different types?

A

allows for numerous different mechanisms of authentication. EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP.

119
Q

EAP-MD5

A

utilizes simple passwords and the challenge handshake authentication process to provide remote access authentication

120
Q

EAP-TLS

A

during authentication, the client and server exchange digital certificates without the need for a username and password but instead the client needs to provide a private key that matches the public key in the digital certificate. TLS is used to establish a secure channel before authentication.

121
Q

EAP-TTLS

A

requires a digital certificate on the server and a password on the client for its authentication. TLS tunnel is established before username and password are provided to prevent eavesdropping.

122
Q

EAP Flexible Authentication via Secure Tunneling (EAP-FAST)

A

uses certificates, credentials, and a TLS tunnel to encrypt traffic between client and server. first client and server exchange credentials, then a TLS tunnel is established, then the client provides credentials and is authenticated. the TLS tunnel remains until the end of the connection.

123
Q

Protected EAP (PEAP)

A

uses server certificates and Microsoft’s Active Directory databases to authenticate a client’s password. also sets up a TLS tunnel for encryption. first establishes a TLS tunnel, then the client verifies the server certificate, then the client gives username and password.

124
Q

Lightweight EAP (LEAP)

A

a proprietary protocol that only works on Cisco-based devices

125
Q

Corporate Owned/Business Only (COBO) - Devices

A

purchased by the company and only used by the employee for work-related purposes

126
Q

Corporate Owned/Personally Enabled (COPE) - Devices

A

company provides a device used for work and/or personal use by employees

127
Q

Choose Your Own Device (CYOD)

A

allows employees to choose a device from an approved list of vendors or devices

128
Q

Storage Segmentation - Devices

A

creates a clear separation between work and personal data on a device into separate partitions.

129
Q

Mobile Device Hardening

A
  1. Update your device to the latest software
  2. Install Antivirus
  3. Train users on proper security and use of their device
  4. Only install apps from the official app stores
  5. Do not jailbreak or root your device
  6. Only use version 2 SIM cards for your devices
  7. Turn off all unnecessary features on your device
  8. Turn on encryption for voice and data
  9. Use strong passwords or biometrics
  10. Don’t allow BYOD
130
Q

What are some vulnerabilities of IoT devices?

A
  1. Insecure Defaults
  2. Hard-coded configurations
  3. Cleartext communication
  4. Data leakage
131
Q

Local Sign-in

A

uses Local Security Authority (LSA) to compare the submitted credentials to the SAM database

132
Q

Network Sign-in

A

uses Kerberos to perform network authentication

133
Q

Remote Sign-in

A

allows users to access the local network by using a VPN or a web portal (SSL/TLS)

134
Q

Account Management

A

set of policies that determine what rights and privileges each user has on a given computer or network

135
Q

What are some encryption methods for data in motion?

A

TLS or SSL, IPSec or L2TP, WPA2 with AES

136
Q

What are some encryption methods for data at rest?

A

Full disk encryption, folder encryption, file encryption, database encryption

137
Q

Degaussing - data destruction

A

exposes the hard drive to a powerful magnetic field which in turn causes previously-written data to be wiped from the drive

138
Q

Purging (Sanitizing) - data destruction

A

act of removing data in such a way that it cannot be reconstructed using any know forensic techniques. Typically involves overwriting the entire drive with zeros multiple times.

139
Q

Erasing or Wiping data - data destruction

A

the process of destroying old data by writing over the location on the hard drive or solid state device with new data

140
Q

Low-level Format - data destruction

A

procedure provided by the manufacturer which will reset the data back to its factory condition

141
Q

Self-Encrypting Drive - data destruction

A

a particular type of hardware that will encrypt the entire disk. getting rid of the key after.

142
Q

Incident Response

A

a set of procedures an investigator follows when examining a computer security incident

143
Q

Incident Management Program

A

consists of monitoring and detection of security events on a computer network and the use of proper responses to those security events

144
Q

Chain of Custody

A

the record of evidence history from collection to court presentation and disposal

145
Q

Faraday Bag

A

shields devices from outside signals to prevent data from being altered, deleted, or added to a new device.

146
Q

Legal Hold

A

preserves all relevant information when litigation is reasonably expected to occur

147
Q

.bat file

A

text-based file containing Windows commands and is interpreted from the command line environment

148
Q

.ps1 file

A

used within windows inside the PowerShell environment. more complex scripts than a batch file

149
Q

.vbs file

A

scripting language based on the Visual Basic programming language

150
Q

.sh file

A

bash script used within linux

151
Q

.py file

A

python language file used in Windows, Linux, and Mac

152
Q

Pseudocode

A

generic language used to teach new learners how to program a computer

153
Q

.js file

A

JavaScript used for automations in webpages and macOS systems

154
Q

What is a dropper?

A

type of malware that is designed to deliver and install other malicious programs. Stage 1 dropper, delivers the Stage 2 payload.