Security+ Flashcards

1
Q

Phishing

A

Social engineering email trying to spoof users into entering in credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Typosquatting

A

Attackers slightly changing the URL to make it look legit.
Ex - www.googe.com instead of www.google.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pharming

A

Occurs when an attacker redirects one website’s traffic to another
website that is bogus or malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vishing

A

(voice phishing) Phone call to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Smishing

A

SMS phishing, text message to you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

targeted phishing with prior reconnaissance done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impersonation

A

attackers impersonate or make up a story to gain your trust or attention.
Ex. “This is Jim calling from Microsoft Support, we need you to call us because there are issues with your computer”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dumpster Diving

A

Physical dumpster diving by an attacker, sifting through trash to get information from things that may have been thrown out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shoulder Surfing

A

Physically looking over someone’s shoulder, looking at your computer and gaining information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hoax

A

A fake situation that is designed to fool your users into thinking its real.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Watering Hole Attacks

A

Attackers target a third party site that you or your users use. They then attack that site, and thus gain access to your information or user’s information.
Ex. Attacking Vanta and redirecting their DNS to a spoofed site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Influence Campaigns

A

Attackers advertise online or post propaganda to influence the opinions of others
Ex - Political campaigns involving falsehoods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tailgating

A

Attacker physically follows you inside the building using your credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Invoice Scams

A

Attacker sends an email with a fake invoice to the user who pays invoices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Credential Harvesting

A

Malware software that extracts credentials stored on your local machine and sends them in an email to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Botnet

A

Group of machines that have the same malware on them. Attackers can execute bulk actions on all machines inside the botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bot

A

Single host in a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Virus

A

Needs human intervention to run, can replicate itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Worms

A

No human intervention, uses vulnerabilities in the OS or apps installed to move itself from system to system. Usually resolved via firewall rules, which stops the network transmission to other hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ransomware

A

encryption of data, ransom has to be met in order for data to be decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Crypto-malware

A

Encrypts all data on a machine and only decrypts and restores it using a proper key. This is the underlying technique behind ransomware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Trojan

A

Software that pretends to be something else, you run it and it turns out to be malware. Designed to be non-threatening to standard AV and other common types of defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PUP (Potentially Unwanted Program)

A

Not malicious in character but bothersome and hard to remove.
Ex - an add toolbar within your web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Backdoor

A

Malware creates a backdoor, or new way of gaining access to your system for easy access in the future. Other malware can use this new backdoor to infect your system, as it now opened a new vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RAT (Remote Access Trojan)

A

Remote administration tool, the ultimate backdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Rootkit

A

Rootkits modify files in the kernel of the OS, making it invisible to AV since AV does not detect the kernel as malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What makes rootkits so dangerous?

A

Rootkits focus on stealth and can create an environment on the kernel of the OS which then allows additional malware to run within that environment, undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Adware

A

Malware that installs a ton of advertisements on your computer and are generally difficult to remove.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Spyware

A

Malware that spies on your computer and activity. Often is a trojan horse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Logic Bombs

A

Waits for a predefined event to happen on a system, then start.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Why is it typically hard to triage a logic bomb?

A

In most cases, logic bombs delete themselves from the system after running - making it hard to trace the route of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Hashing

A

technique used to protect user passwords by converting them into a different form called a hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is SHA-256?

A

A popular hashing algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Hash Function

A

the algorithm used to hash the plaintext password values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Hash Value

A

The result of the password going through the hash function. These are very very large in length and are nearly impossible to have duplicates unless the plaintext password is the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Hash Space

A

the set of all possible hash values that can be produced by a particular hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Hash Collision

A

when two hash values are the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Salting

A

A unique identifier added to plaintext passwords BEFORE running them through a hash function. This is to differentiate them if multiple users use the same password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Rainbow Tables

A

Optimized, pre-built table of hash values for common passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How are passwords in databases typically kept?

A

The passwords in databases are typically salted and hashed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Spraying Attack

A

systematically trying a few commonly used passwords against multiple accounts or targets before stopping to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Brute Force

A

systematically trying all possible combinations of passwords until the correct one is found.

-You can also brute force hashes if an attacker grabs a hash value.
-They can go through a wordlist and put all of them through a hash function until they get a resulting hash value that matches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Dictionary Attack

A

systematically trying a list of common words, phrases, or passwords from a pre-existing “dictionary.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Physical Attacks

A

Compromised USB devices, cables, etc.
Skimming credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Adversarial AI

A

When PII is put into an AI system and attackers interact with the AI system and get the bot or system to give it PII data that was used to train it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Supply Chain Attacks

A

When a third party vendor is attacked and the attack is then transferred over to you.
Ex - LastPass hacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Privilege Escalation

A

Design flaw that allows a normal user to gain access to administrative permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Cross Site Scripting (XSS)

A

type of security vulnerability that occurs when a website or web application allows malicious scripts to be injected and executed in users’ browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Stored XSS

A

On the site itself, anyone who visits the site runs the malicious script.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Reflected XSS

A

User has to visit the site and click a particular section or button to get the malicious script to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Injection Attack

A

type of security attack where malicious code is inserted into a computer program or system, causing it to execute unintended commands or actions
Ex. - SQL Injections are very common.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Buffer Overflow

A

a type of security vulnerability that occurs when a program or system writes more data into a buffer (a temporary storage area) than it can handle. This extra data overflows into adjacent memory locations, potentially causing the program to crash or allowing the attacker to execute malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Replay Attacks

A

an attacker intercepts and maliciously retransmits captured data to deceive a system or gain unauthorized access. In simple terms, a replay attack occurs when an attacker copies and replays previously captured data to trick a system into accepting it as valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Request Forgeries

A

an attacker tricks a user’s web browser into making an unintended and unauthorized request on their behalf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is an example of a request forgery attack?

A

Ex - You’re signed into your bank account on one tab and visit a malicious site on another tab. This site runs a script that makes a request related to your bank account and because you are already signed in, the request goes through without you even realizing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Driver Manipulation

A

Attacks that utilize the drivers built into your OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

SSL Stripping

A

a type of attack where an attacker intercepts communication between a user’s web browser and a website, and downgrades the secure HTTPS connection to an insecure HTTP connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Race Conditions

A

occur when different parts of a program “race” to use the same thing, and the order they finish in affects the final result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is an example of a race condition flaw?

A

You and Jamie wanting to put $50 into the checking account but you both do it at the same time and now you have $100 in the account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Rouge Access Points

A

Access point that has been added to your network without your authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Wireless Evil Twin

A

Malicious Network with same SSID as your real one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Bluejacking

A

Sending a message to someone else’s device via bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Bluesnarfing

A

attackers gain unauthorized access to information on a Bluetooth-enabled device, such as a smartphone or tablet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Wireless Disassociation

A

disruption attacks that disrupts or disconnects wireless network connections between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Wireless Jamming

A

Attackers transmit interference signals that take down a network due to interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

RFID Attack

A

can do replay attack and spoof the RFID ID, jam the signal between the RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

NFC Attack

A

can do replay attack and spoof the NFC ID, jam the signal between the NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Randomizing Cryptography

A

When the encryption method does not do a good enough job of obscuring the original value.

Ex - “Password” turned into “Passw0rd”. You can still tell the original value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Cryptographic Nonce

A

a unique and random number used in cryptography to add extra security to communication and prevent replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

On-Path Attack

A

MITM (man in the middle) attack, where an attacker inserts themselves into the communication path between two parties. By doing so, they can intercept and manipulate the data being transmitted between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Address Resolution Protocol (ARP)

A

a network protocol used to translate or resolve IP addresses to physical or MAC addresses in a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

MAC Cloning

A

involves creating a duplicate or fake MAC address to impersonate another device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

MAC Flooding

A

a technique where a large number of MAC addresses are continuously sent to a network switch, overwhelming its memory capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

DNS Poisoning

A

a technique used by attackers to manipulate or corrupt the information in the DNS server’s cache.
Ex - An attacker changes the value in the DNS server to a malicious one. Once a user queries the DNS server, they are redirected to the malicious site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Denial of Service (DoS)

A

attacker overwhelms a target system or network with a flood of excessive requests or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Malicious Scripts/Scripting

A

Scripts that can help attackers automate the attack pipeline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Threat Actor

A

an entity responsible for an event that has a negative impact on a different entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Insider

A

Someone on the inside of your organization that is doing something malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Nation State

A

Someone from the government that is doing something malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Hacktivist

A

Hacker +Activist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Script Kiddie

A

A beginner who runs pre-made scripts to execute cyber attacks but does not necessarily know what is actually going on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Organized Crime

A

Professional criminals, motivated by financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Shadow IT

A

the user working around their internal IT department.
Ex - Someone purchasing their own laptop and working from that instead of a corporate owned one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Attack Vector

A

a method used by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Threat Intelligence

A

Researching latest threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Open Source Intelligence (OSINT)

A

Intel from publicly available sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Closed Intelligence

A

Have to pay cost to a provider for expert level intel on vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

CVE

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Indicators of Compromise (IOC)

A

An event that indicates an intrusion
Irregular patterns or abnormalities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

SIEM

A

Security Information & Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

SOAR

A

Security Orchestration Automation & Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

How many “color” security teams are typically in an organization? What are the 4 colors?

A

4 Teams - Red, Blue, Purple, White

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Red Team

A

Offensive, attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Blue Team

A

Defense, defenders, incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Purple Team

A

Both red and blue team, both share information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

White Team

A

Oversees the red and blue teams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Configuration Management

A

Documenting change of configurations and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Baseline Configuration

A

Getting an idea of what your baseline is so you can build and improve off of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Standard Naming Convention

A

defining a standard naming convention for endpoints, APs, and other points of your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Data Masking

A

using asterisk or some form of censorship to protect sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

PII

A

Personal Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Data Encryption

A

Encrypting data to protect it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Plaintext

A

data before encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Ciphertext

A

data after encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Data At Rest

A

Data sitting stationary on a drive, not moving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Data In Motion

A

Data transmitted over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Data In Use

A

Data actively processing in the memory of an OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Tokenization

A

the process of replacing sensitive data, such as credit card numbers or personal identification information, with unique identification tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is a real world example of tokenization?

A

Used in NFC credit card transactions, your card number never actually gets sent to the merchant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Information Rights Management (IRM) -

A

a security approach that allows organizations to control and protect sensitive information throughout its lifecycle. With IRM, users can apply specific access permissions, restrictions, and encryption to their documents or files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Data Loss Prevention (DLP)

A

a security strategy and set of technologies that aim to prevent sensitive data from being lost, leaked, or exposed to unauthorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Incident Response Plan

A

plan that executes in the event of an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

HoneyPot

A

A fake system that looks enticing for hackers to attack. No real access to your production system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Define the user’s role in security in: Infrastructure as a Service (IaaS), such as AWS.

A

You still have to maintain security in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Define the user’s role in security in: Software as a Service (SaaS), like Hi Marley.

A

3rd party service responsible for security and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Define the user’s role in security in: Platform as a Service (PaaS), such as AWS Elastic Beanstalk.

A

3rd party provides building blocks for building web applications, security responsibility is shared between the provider and the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

MSSP

A

Managed Security Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

IaaC

A

Infrastructure as code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

VM Sprawl

A

When you do not spin down VMs after they are no longer needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Authentication Methods

A

Methods used by an end user to gain access to a system.

121
Q

Kerberos

A

an authentication method that provides secure and trusted access to network resources. It uses a client-server model to verify the identities of users and services before granting access.

Ex - Like a ticketing system for authentication

122
Q

LDAP

A

Authentication against a directory service, such as Microsoft AD.

123
Q

Federation

A

Authentication using a third party site like Google, Facebook, Apple, etc.

124
Q

Attestation

A

Proving the hardware that is connecting to your network is really yours. This prevents employees from using personal machines.

125
Q

TOTP

A

Time-based One-Time Password.

126
Q

Biometrics

A

Touch ID, Face ID, etc. for authentication

127
Q

MFA

A

Multi-Factor Authentication

128
Q

RAID

A

Redundant Array of Independent Disks. It is a technology that combines multiple physical hard drives into a single logical unit to improve data storage performance, reliability, and/or capacity. If one drive fails, the other ones can pick up the slack.

129
Q

What are the 4 “somethings” of MFA?

A

Something you have (Phone, MFA code)
Something you are (Fingerprint, FaceID)
Somewhere you are (Based on geographic location)
Something you can do (Handwriting analysis)

130
Q

Cipher

A

The algorithm used to encrypt

131
Q

Cryptanalysis

A

The art of cracking encryption

132
Q

Cryptographic Key

A

essentially a secret code that enables encryption and decryption processes.

133
Q

Homomorphic Encryption

A

an advanced cryptographic technique that allows computations to be performed on encrypted data without decrypting it first. In simple terms, it enables computations to be carried out on sensitive data while it remains encrypted, providing privacy and security.

134
Q

Symmetric Encryption

A

uses a single key to encrypt and decrypt data.

135
Q

Asymmetric Encryption

A

two or more keys. One to decrypt and one to encrypt.

136
Q

Key Pair

A

a pair of cryptographic keys that are mathematically related. The pair consists of a public key and a private key, and they work together to provide secure communication and data protection.

137
Q

Digital Signature

A

cryptographic technique used to verify the authenticity and integrity of digital messages, documents, or software. It provides a way to prove that a particular piece of digital content originated from a specific sender and has not been tampered with.

138
Q

Steganography

A

a technique used to hide secret or sensitive information within seemingly innocuous or unrelated digital content, such as images, audio files, or text documents. It is the practice of concealing one message within another to prevent detection by unintended recipients.

139
Q

What is a real world example of steganography?

A

Ex - If a youtube thumbnail has a picture of a giraffe but when you click on the video, it is actually PII.

140
Q

Stream Cipher

A

a cryptographic algorithm that operates on individual bits or bytes of data, encrypting or decrypting them one at a time in a continuous stream

141
Q

Block Cipher

A

a type of encryption algorithm that operates on fixed-length blocks of data. It breaks the plaintext into fixed-size blocks and applies a series of encryption steps to each block individually, resulting in corresponding blocks of ciphertext.

142
Q

Cipher Block Chaining (CBC)

A

a mode of operation used in block ciphers to provide confidentiality and integrity to encrypted data. It is a widely used mode that adds an extra layer of security to the encryption process.

Ex - Works by combining the plaintext blocks with the ciphertext blocks from the previous encryption step. Each plaintext block is XORed (combined with) the previous ciphertext block before being encrypted.

143
Q

Blockchain

A

digital ledger technology that allows multiple parties to maintain a shared and tamper-proof record of transactions or data

144
Q

Why can’t you edit information in a Blockchain?

A

Each block is “locked” to the previous one, no transaction or event can be changed once put into the blockchain.

145
Q

Endpoint Detection and Response (EDR)

A

protects endpoints by continuously monitoring and analyzing the behavior of endpoints, providing timely alerts and enabling rapid incident response to keep your devices and data safe.

146
Q

Next Generation Firewall (NGFW)

A

a type of advanced network security device that combines traditional firewall capabilities with additional features for enhanced protection. It provides a more intelligent and dynamic approach to network security by inspecting network traffic at the application layer, allowing it to identify and block not only basic threats but also more sophisticated attacks.

147
Q

Host-Based Intrusion Detection System (HIDS)

A

works by analyzing system logs, file integrity, network connections, and other host-related events to identify potential attacks. Lives on the host itself

148
Q

Host-Based Intrusion Prevention System (HIPS)

A

unlike HIDS, HIPS not only detects and alerts about potential intrusions or security breaches but also takes proactive measures to prevent them. It can actively block or restrict suspicious activities, such as unauthorized access attempts, malware execution, or system configuration changes

149
Q

Boot Integrity

A

the assurance that the initial startup process of a computer system, known as the boot process, has not been compromised or tampered with

150
Q

Trusted Platform Module (TPM)

A

a hardware-based security component that provides a secure foundation for security functions. This component is built into the motherboard of the computer.

151
Q

BIOS Secure Boot

A

Secure boot ensures that nothing on the bootloader has changed or been tampered with from the last time it was booted. If it has, it will not boot the machine.

152
Q

Trusted Boot

A

This verifies the digital signature of the actual OS Kernel to ensure it has not been changed or tampered with. If it has, the boot will stop.

153
Q

Early Launch Anti-Malware (ELAM)

A

Checks every installed driver on the machine to ensure it is trusted. If a driver is untrusted, the computer will not load it.

154
Q

Measured Boot

A

a security feature that checks if the computer’s startup process has been changed or tampered with. It keeps a record of the boot components and compares them during each startup to detect any unauthorized modifications

155
Q

Application Security

A

The process of making sure your web application is secure.

156
Q

Input Validation

A

a process used to verify and ensure the correctness, integrity, and safety of data entered into an application.

157
Q

Dynamic Analysis (fuzzing)

A

a software testing technique used to discover vulnerabilities or software defects by feeding unexpected, random, or malformed inputs to an application or system. The goal is to cause the application to behave in different ways.

158
Q

Cookies

A

small files that websites store on your computer or device to remember information about you

159
Q

HTTP Secure Headers

A

additional security measures used by web servers to protect websites. They can restrict the type of processes that occur while the website or web application is being used.

160
Q

Code Signing

A

a security practice used to verify the authenticity and integrity of software or code. It involves digitally signing the code with a unique cryptographic signature to confirm its origin and ensure that it has not been tampered with.

161
Q

Static Application Security Testing (SAST)

A

a technique used to analyze the source code or software application without executing it. It involves scanning the codebase for potential security vulnerabilities, coding errors, and other issues that could pose a risk to the application’s security.

162
Q

Dynamic Application Security Testing (DAST)

A

technique used to assess the security of a web application by analyzing it while it is running. DAST runs the app in a closed environment and actively tries to attack it.

163
Q

Load Balancing

A

a technique used to distribute incoming network traffic across multiple servers or resources to ensure optimal performance and prevent overload

164
Q

Network Segmentation

A

the practice of dividing a computer network into smaller, isolated subnetworks or segments to ensure network security.

165
Q

Virtual Local Area Networks (VLAN)

A

a technology that allows the creation of logical network segments within a physical network infrastructure. VLANs separate network devices into different broadcast domains, even if they are connected to the same physical network. This ensures you can complete network segmentation while still using the same hardware.

166
Q

Screened Subnet (DMZ)

A

a network architecture that adds an additional layer of security between an internal network and an external network, such as the internet. It involves creating a separate subnet where publicly accessible services, such as web servers or email servers, are placed. When in this zone, communication is not possible to other aspects of your network.

167
Q

Zero Trust Networking

A

Traffic flow within the network itself is verified every step of the way to ensure authenticity and trust.

168
Q

Virtual Private Network (VPN)

A

Encrypted private network.

169
Q

Name the 4 most common types of VPNs

A

-Site to Site VPN
-Remote Access VPN
-SSL/TLS VPN
-IPSec VPN

170
Q

Site-to-Site VPN

A

also known as a network-to-network VPN, connects multiple networks located in different physical locations over the internet.

171
Q

Remote Access VPN

A

enables individual users to securely connect to a private network from a remote location.

172
Q

SSL/TLS VPN

A

utilizes SSL or TLS protocols to establish a secure connection between a client’s web browser and a remote network or application. It provides secure remote access to specific web-based resources without requiring the installation of dedicated VPN client software.

173
Q

IPSec VPN

A

a protocol suite that provides secure communication over IP networks. It can be implemented in both site-to-site and remote access scenarios,

174
Q

VPN Concentrator

A

serves as a central point for aggregating and processing VPN connections from various sources.

175
Q

Full Tunnel

A

all traffic from the client goes through the VPN concentrator.

176
Q

Split Tunnel

A

some traffic from the client goes through the VPN concentrator.

177
Q

Stateless Firewall

A

each network packet is inspected and compared against the NACL, regardless of past history.

178
Q

Stateful Firewall

A

remembers what was allowed previously and uses that information to determine if the traffic should be approved or denied.

179
Q

Web Application Firewall (WAF)

A

designed to protect web applications from various online threats and attacks. It sits between the web server and the internet, monitoring and filtering the incoming and outgoing web traffic.

180
Q

Network Access Control (NAC)

A

a security technology that regulates and controls access to a computer network based on the identity and security posture of devices or users

181
Q

Access Control List (ACL)

A

allow/disallow traffic based on attributes (IP, port, etc.)

182
Q

Proxy Server

A

All traffic goes through this server, making traffic requests on behalf of users instead of them doing it themselves.

183
Q

Jump Server

A

A server accessible via VPN or other means. Once accessed, you can “jump” to other servers inside the private network.

184
Q

Security Assertion Markup Language (SAML)

A

an XML-based standard used for exchanging authentication and authorization information between different systems. It enables Single Sign-On (SSO) functionality, allowing users to authenticate once and access multiple applications or services without the need to provide credentials repeatedly.

185
Q

Open Authorization (OAuth)

A

an industry-standard protocol used for secure and delegated access to resources on the web. It allows users to grant permission to third-party applications or services to access their protected resources (such as personal data or online accounts) without sharing their login credentials

186
Q

What is a real world example of OAuth?

A

Ex - Linking your LinkedIn with your Google Account.

187
Q

Role Based Access Control (RBAC)

A

Access to systems based on your role and functions within the business.

188
Q

Conditional Access

A

a security measure that allows or denies access to resources based on specific conditions or criteria. It ensures that users can access sensitive information or systems only when certain requirements are met.

189
Q

Privileged Access Management (PAM)

A

a security practice that focuses on managing and controlling access to privileged accounts or administrative privileges within an organization’s IT infrastructure

190
Q

Certificate Authority (CA)

A

a trusted entity that issues digital certificates to validate the authenticity and integrity of information in electronic transactions

191
Q

Recovery Time Objective (RTO)

A

the maximum acceptable amount of time a business or system can be offline or non-functional before recovery or restoration is completed

192
Q

Recovery Point Objective (RPO)

A

represents the maximum acceptable amount of data that can be lost or unrecoverable in the event of a disruption or incident.

193
Q

Functional Recovery Plan (FRP)

A

a document or strategy outlining the specific steps and procedures required to restore and resume the normal functioning of a system, process, or business function after an incident or disruption

194
Q

Disaster Recovery Plan (DRP)

A

a structured and documented approach that outlines the steps and procedures to recover and restore critical systems, data, and infrastructure after a major disruption or disaster.

195
Q

What is the difference between FRP and DRP?

A

DRP focuses on the entire business as a whole while FRP focuses on a specific aspect of the business that may have experienced a disruption or outage.

196
Q

What is the difference between RTO and RPO?

A

RTO is in regard to time or duration acceptable for an outage.

RPO is in regard to an amount of data lost in an outage that is acceptable. For example, if an RPO is 1 hour - the company would be expected to be able to restore data from a backup at least 1 hour BEFORE the outage happened.

197
Q

Protected Health Information (PHI)

A

any individually identifiable health information that is collected, stored, or transmitted by healthcare providers

198
Q

Data Minimization

A

a principle of privacy and data protection that advocates for collecting, processing, and retaining only the minimum amount of personal data necessary for a specific purpose.

199
Q

What tool would help a security analyst identify rouge devices on a network?

A

Router and switch-based MAC address reporting.

200
Q

What is the hashing algorithm that results in a 128-bit fixed output?

A

MD-5

201
Q

IP spoofing is involved in what type of attack?

A

On-path attack

202
Q

Defense in Depth

A

the concept of layering various network appliances and configurations to create a more secure and defensible architecture

203
Q

What is a popular asymmetric encryption algorithm?

A

Diffie-Hellman (DH)

204
Q

Chain of Custody

A

the documented and verifiable trail that tracks the handling, transfer, and storage of digital evidence or sensitive information throughout its lifecycle.

205
Q

Discretionary access control (DAC)

A

control access to resources based on the discretion of the resource owner

206
Q

Mandatory Access Control (MAC)

A

enforce strict access controls based on predefined rules and policies

207
Q

Attribute-Based Access Control (ABAC)

A

control access to resources based on attributes associated with users, objects, and the environment

208
Q

What port is used for HTTPS?

A

443

209
Q

What port is used for RDP?

A

3389

210
Q

What port is used for FTP?

A

21

211
Q

What port is used for LDAP?

A

389

212
Q

Smurf Attack

A

uses a single ping with a spoofed source address sent to the broadcast address of a network. This causes every device within the network to receive a single ping, which appears to come from the device with the spoofed source address. Each network device then responds to the spoofed address, causing the victim (whose address was spoofed) to be overwhelmed with the responses to the initial ping.

213
Q

Reverse Proxy

A

A reverse proxy is positioned at the cloud network edge and directs traffic to cloud services if the contents of that traffic comply with the policy.

214
Q

Which analysis framework provides a graphical depiction of the attacker’s approach relative to a kill chain?

A

The Diamond Model of Intrusion Analysis

215
Q

Mean time between failures (MTBF)

A

the average time between system breakdowns

216
Q

Mean time to repair (MTTR)

A

the average time it takes to restore a system or component after a failure

217
Q

Is the “Blowfish” cryptographic algorithm asymmetric or symmetric?

A

Symmetric

218
Q

Exact Data Match (EDM)

A

a pattern matching technique that uses a structured database of string values to detect matches.

Ex - A company might have a list of actual social security numbers of its customers. But, since it is not appropriate to load these numbers into a DLP filter, they could use EDM to match the numbers’ fingerprints instead based on their format or sequence

219
Q

Cain and Abel

A

a software program that can be utilized to uncover passwords by various methods such as brute-force attacks

220
Q

John The Ripper

A

a software program used to test strength of passwords

221
Q

PAP authentication

A

Password Authentication Protocol - simply username/password, nothing else.

222
Q

CRLF Injection Attack

A

Carriage Return Line Feed injection is a common vulnerability that can be used to manipulate or abuse applications that handle user-supplied input. It involves injecting special characters, namely the carriage return (‘\r’) and line feed (‘\n’) characters, into input fields or parameters.

223
Q

SPI

A

Sensitive Personal Information - any personal data or information that, if compromised or misused, could lead to harm, identity theft, discrimination, or significant privacy violations for an individual

224
Q

What is used as a measure of biometric performance to rate the system’s ability to correctly authenticate an authorized user by measuring the rate that an unauthorized user is mistakenly permitted access?

A

False acceptance rate

225
Q

Desktop as a Service (DaaS)

A

provides a full virtualized desktop environment from within a cloud-based service

226
Q

Rouge Anti-virus

A

A malware programmed to look like an anti-virus on a user’s machine, trick them into thinking their machine is infected and taking actions to stop or prevent the infection

227
Q

What is a proprietary tool used to create forensic disk images without making changes to the original evidence?

A

FTK Imager

228
Q

FM-200

A

Common fire extinguisher system used in buildings. Should have them in data centers to prevent a fire from spreading around the building and destroying information.

229
Q

DPO

A

Data Protection Officer - Ensure that her organization processes the personal data of its staff, customers, providers, or any other individuals (also referred to as data subjects) in compliance with the applicable data protection rules.

230
Q

Polymorphic Virus

A

virus that alters its binary code to avoid detection by antimalware scanners that rely on signature-based detection. By changing its signature, the virus can avoid detection.

231
Q

What compliance standard affects financial institutions?

A

GLBA

232
Q

Degaussing

A

the process of removing or reducing unwanted magnetic fields from an object, such as a magnet or a magnetic storage device like a hard drive.

233
Q

Banner Grabbing

A

conducted by actively connecting to the server using telnet or netcat and collecting the web server’s response. This banner usually contains the server’s operating system and the version number of the service (SSH) being run

234
Q

Lessons Learned Report

A

provides you with the details of the incident, its severity, the remediation method, and, most importantly, how effective your response was

235
Q

Qualitative risk assessment

A

categorizes things based on the likelihood and impact of a given incident using non-numerical terms, such as high, medium, and low

236
Q

Quantitative risk assessment

A

provides exact numbers or percentages of risk for each thing

237
Q

What IP address protocol has IPSec built into it?

A

IPv6

238
Q

Autopsy

A

a cross-platform, open-source forensic tool suite

239
Q

What is an uncredentialed vulnerability scan?

A

Its a scan that did not authenticate into anything on the network. This is also known as an outward facing scan, since anything it picked up in results was outside the network.

240
Q

Asymmetric or Symmetric: RSA

A

Asymmetric

241
Q

Asymmetric or Symmetric: DSA

A

Asymmetric

242
Q

Asymmetric or Symmetric: ECC

A

Asymmetric

243
Q

Asymmetric or Symmetric: Diffie-Hellman Key Exchange (DH)

A

Asymmetric

244
Q

Asymmetric or Symmetric: AES

A

Symmetric

245
Q

Asymmetric or Symmetric: RC4

A

Symmetric

246
Q

Asymmetric or Symmetric: DES

A

Symmetric

247
Q

Asymmetric or Symmetric: PGP

A

Asymmetric

248
Q

Asymmetric or Symmetric: Blowfish

A

Symmetric

249
Q

Asymmetric or Symmetric: Twofish

A

Symmetric

250
Q

Cognitive Password Attack

A

Uses information from social media to guess the user’s password

251
Q

What is considered the weakest wireless network protocol?

A

Wired equivalent privacy (WEP)

252
Q

Insecure direct object references (IDOR)

A

a cybersecurity issue that occurs when a web application developer uses an identifier for direct access to an internal implementation object but provides no additional access control and/or authorization checks

Ex - www.google.com/user=andrew.cd

253
Q

Whaling

A

When an attacker targets C-level executives in the company

254
Q

Hybrid Attack

A

When you combine two types of password cracking attacks.

For example - Dictionary Attack + Brute Force Attack

255
Q

Which hashing algorithm results in a 160-bit fixed output?

A

RIPEMD

256
Q

The NTLM hashing algorithm results in how many bits of fixed output?

A

128

257
Q

Which of the following vulnerabilities involves leveraging access from a single virtual machine to other machines on a hypervisor?

A

VM Escape

258
Q

What network protocol is required if you are using RADIUS for network authentication?

A

802.1x

259
Q

UEBA

A

User and Entity Behavior Analytics , A system that can provide automated identification of suspicious activity
by user

260
Q

CYOD

A

Choose Your Own Device

261
Q

HSM

A

Hardware Security Module, An appliance for generating and storing cryptographic keys that is less susceptible to
tampering and insider threats than software-based storage

262
Q

UEFI

A

Unified Extensible Firmware Interface, A type of system firmware providing support for 64-bit CPU operation
at boot, full GUI and mouse operation at boot, and better boot
security

263
Q

SDLC

A

Software Development Lifecycle

264
Q

RCE

A

Remote Code Execution, occurs when an attacker is able to execute or run commands
on a remote computer

265
Q

What type of attack is the exam showing if it displays “1=1”?

A

SQL Injection

266
Q

Extranet

A

Specialized type of DMZ that is created for your partner organizations to
access over a wide area network

267
Q

War Dialing

A

Protect dial-up resources by using the callback feature

268
Q

Honeynet

A

A group of computers, servers, or networks used to attract an attacker

269
Q

VDI

A

Virtual Desktop Infrastructure

270
Q

Private Cloud

A

Using a cloud provider’s network, ex - AWS

271
Q

Public Cloud

A

Using a publicly accessible, widely available online solution, Ex - Google Drive

272
Q

Community Cloud

A

cloud resources are shared among several different organizations who have common service needs. Ex - GovCloud

273
Q

SECaaS

A

Security As A Service

274
Q

CASB

A

Cloud Access Security Broker, Enterprise management software designed to mediate access to cloud services
by users across all types of devices

275
Q

FaaS

A

Function as a Service (AWS Lambda)

276
Q

CORS Policy

A

A content delivery network policy that instructs the browser to treat
requests from nominated domains as safe

277
Q

What is CI/CD?

A

Continuous integration and continuous delivery

278
Q

What ports does RADIUS use on a network?

A

1812/1813

279
Q

What port does IMAP use on a network?

A

143

280
Q

What port does POP3 use on a network?

A

110

281
Q

What port does SMTP use on a network?

A

25

282
Q

What port does FTP use on a network?

A

21

283
Q

What port does HTTP use on a network?

A

80

284
Q

What port is used to access Syslog on a network?

A

514

285
Q

Ping Flood

A

An attacker attempts to flood the server by sending too many ping requests.

286
Q

MITB

A

Man-in-the-Browser

287
Q

What port does Kerberos use on a network?

A

88

288
Q

What port does VNC use on a network?

A

5900

289
Q

Privilege Creep

A

Occurs when a user gets additional permission over time as they rotate through different positions or roles

290
Q

Rubber Hose Attack

A

Attempt to crack a password by threatening or causing a
person physical harm in order to make them tell you the
password

291
Q

SNMP

A

Simple Network Management Protocol

292
Q

FIM

A

File Integrity Monitoring

293
Q

What is the difference between a runbook and a playbook?

A

Runbook - Step by step tutorial

Playbook - Who is involved, who does what, in responding to incidents.

294
Q

MTD

A

Maximum Tolerable Downtime - maximum amount of time a business can be down before irreversible damage occurs.

295
Q

HAVA

A

Help America Vote Act

296
Q

PCI DSS

A

Payment Card Industry Data Security Standard

297
Q

GDPR

A

General Data Protection Regulation - no personal data can be collected about a person without informed consent

298
Q

What is the difference between purging data and clearing data?

A

Purging there is certainty the contents can never be reconstructed after deleted.