Security Analyst Questions Flashcards
Interview
Black Hat
hackers are criminals who break into computer networks with malicious intent.
Also known as Ethical Hackers. They are certified hackers who learn hacking from courses. These are good hackers who try to secure our data, websites.
White Hat Hacker
A mix of both Black-Hat and White-Hat hackers. These types of hackers find vulnerabilities in systems without the permission of owners. They don’t have any malicious intent. However, this type of hacking is still considered illegal.
Grey Hat Hacker
A method of determining which ports on a network are open and could be receiving or sending data.
Port Scanning
A group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses.
Red Team
A group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and make certain all security measures will continue to be effective after implementation.
Blue Team
A device that allows or blocks the network traffic according to the rules.
Firewall
A security vulnerability caused by incomplete or incorrect misconfiguration.
Security Misconfiguration
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
Vulnerability
The level of impact on agency operations (including mission functions, image, or reputation), agency assets, or individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occurring.
Risk
Any circumstance or event with the potential to adversely impact organizational operations, organizational assets, individuals, other organizations, or the Nation through a system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
Threat
Following the set of standards authorized by an organization, independent part, or government.
Compliance
A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
MITRE ATTACK
An extra layer of security used to make sure that people trying to gain access to an online account are who they say they are. First, a user will enter their username and password. Then, instead of immediately gaining access, they will be required to provide another piece of information.
2FA
Share some general endpoint security product categories
Antivirus
EDR (Endpoint Detection and Response)
XDR (Extended Detection and Response)
DLP (Data Loss Prevention)
What is HIDS?
HIDS means Host Intrusion Detection System. HIDS is located on each host.
What is NIDS?
NIDS means Network Intrusion Detection System. NIDS is located in the network.
A common model that forms the basis for the development of security systems.
CIA Triad
Involves the efforts of an organization to make sure data is kept secret or private.
Confidentiality
Involves making sure your data is trustworthy and free from tampering.
Integrity
Systems, networks, and applications must be functioning as they should and when they should.
Availability
What is AAA?
Authentication
Authorization
Accounting
Involves a user providing information about who they are. Users present login credentials that affirm they are who they claim.
Authentication
A user can be granted privileges to access certain areas of a network or system.
Authorization
Keeps track of user activity while users are logged in to a network by tracking information such as how long they were logged in, the data they sent or received, their Internet Protocol (IP) address, the Uniform Resource Identifier (URI) they used, and the different services they accessed.
Accounting
Framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.
Cyber Kill Chain
A security solution that provides the real time logging of events in an environment. The actual purpose for event logging is to detect security threats.
SIEM
Serve as forensic evidence of potential intrusions on a host system or network. These artifacts enable Information Security (InfoSec) professionals and system administrators to detect intrusion attempts or other malicious activities.
Indicator of Compromise (IoC)
Demonstrate the intentions behind a cyberattack and the techniques used by the threat actor to accomplish their objectives.
Indicator of Attack (IoA)
If the situation to be detected and the detected (triggered alert) situation are the same
True Positive
In short, it is a false alarm. When an IDS or IPS flags non-malicious traffic as malicious.
False Positive
A conceptual model that describes the universal standard of communication functions of a telecommunication system or computing system.
OSI Model
A method used in a TCP/IP network to create a connection between a host and a client.
Three-Way Handshake
Explain the Three-Way Handshake
- The client sends a SYN(Synchronize) packet to the server check if the server is up or has open ports
- The server sends SYN-ACK packet to the client if it has open ports
- The client acknowledges this and sends an ACK(Acknowledgment) packet back to the server
Is the default method of data communication on the Internet. It was developed by the United States Department of Defense to enable the accurate and correct transmission of data between devices.
TCP/IP Model
What is the difference between the TCP/IP Model and the OSI Model?
The TCP/IP model is a simpler, four-layer model that focuses on the actual workings of the internet, while the OSI model is a more detailed seven-layer model that provides a conceptual framework for understanding network communication.
Is a communication protocol used for discovering the Data Link Layer address, such as a MAC address, associated with a given Network Layer address, typically an IPv4 address.
Address Resolution Protocol (ARP)
Is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.
Domain Host Configuration Protocol (DHCP)
Is like the internet’s phone book, translating domain names (like google.com) into IP addresses (like 172.217.1.46) so computers can communicate with each other.
Domain Name Server (DNS)
Creates a secure, encrypted connection over a public network like the internet, allowing users to browse the web privately and securely. It masks their IP address and encrypts their data, enhancing privacy and security, particularly when accessing sensitive information or bypassing geographical restrictions.
Virtual Private Network (VPN)
Is a network segmentation technique that allows administrators to logically divide a single physical network into multiple isolated virtual networks.
Virtual Land Area Network (VLAN)
Is a networking device that forwards data packets between computer networks. Responsible for directing traffic based on IP addresses, enabling communication between devices on different networks.
Router
Is a networking device that connects multiple devices within a local area network (LAN) and forwards data packets to their intended destination based on MAC addresses. It operates at the data link layer of the OSI model and helps manage network traffic efficiently by creating direct paths between devices.
Switch
Is a connectionless protocol that provides a simple and lightweight method for sending data packets over a network. It is commonly used for applications that prioritize speed and efficiency over reliability, such as real-time streaming or online gaming.
User Datagram Protocol (UDP)
Is a connection-oriented protocol that ensures reliable and ordered delivery of data packets over a network. It establishes a virtual connection between sender and receiver, handling error correction, flow control, and congestion control to guarantee data integrity and successful transmission.
Transmission Control Protocol (TCP)
What is the difference between UDP and TCP?
UDP and TCP are transport layer protocols. TCP has error checking and guaranties that packets have been received while UDP does not.
- Close all unnecessary ports
- Patch the server so that all software is up to date
- Tightly control user access
Steps to ensure a server is secure
Is a tool used to trace the path of an IP packet as it traverses routers. It works by incrementing the TTL field until the packet reaches the destination IP.
Traceroute
Is a logical subdivision of an IP network. The practice of dividing a network into two or more networks
Subnet
Is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.
MAC Address
Is a method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
Network Address Translation (NAT)
Is a network protocol that builds a loop-free logical topology for Ethernet networks.
Spanning Tree Protocol (STP)
The process of distributing a set of tasks over a set of resources, with the aim of making their overall processing more efficient.
Load Balancer
Also known as a virtual machine monitor or virtualizer, is a type of computer software, firmware or hardware that creates and runs virtual machines.
Hypervisor