SOC - technical q Flashcards
What does OSI stand for and what’s it used for?
Open System Interconnection, a framework that divides and details the steps on network communications
What are the 7 layers of the OSI model?
Application Layer – human-computer interaction layer
Presentation Layer – Ensures that data is in a usable formation and is where data encryption occurs
Session Layer – Maintain connections and is responsible for controlling ports and sessions
Transport Layer – Transmit data using transmission protocols (tcp/udp)
Network Layer – decides the physical path the data will take
Data Link – defines the format of the data on the network
Physical – transmit raw bot stream over the physical medium
What is the “Pyramid of Pain” model?
Ranks the IOCs from the least valuable to the most valuable. Bottom being trivial to the top being most difficult
What are the layers of the Pyramid of Pain?
TTP - Tactics, techniques and procedures
Tools
Network/ Host Artifact
Domain name
IP Addresses
Hash Values
What is NIST and its purpose?
National Institute of Standards and Technology
Designed to help businesses understand, manage and reduce cyber security risks.
What are the steps of NIST?
Identity
Protect
Detect
Respond
Recover
What is Punycode?
Used by attackers to redirect to a malicious domain that looks legitimate. Punycode is a way of converting words that cannot be written in ASCII, into unicode ASCII coding.
What is Any.Run?
Is a sandboxing service that executes samples, that we can review any connections such as http requests, DNS requests or processes communicating with an IP address.
What is Fuzzy hashing?
Allows you to perform similarity analysis to match two files with minor differences based on fuzzy hash.
What is Pass-the-Hash?
Exploits Single Sign-On (SS0) through NT Lan Manager (NTLM), Kerberos, and other authentication protocols.
What is Mitre Attack?
Is a globally accessible knowledge base of adversary tactics and techniques used based on real world observations. The mitre attack knowledge base is now a foundation used to develop models and methodologies in the private sector.
What is a vulnerability?
a flaw or a weakness in some parts of a system security procedure.
What is a threat?
A threat is a potential negative occurrence that can have consequences for a business operation/function/reputation.
What is a risk?
the probability that a particular threat will occur, either intentionally or accidently.
What is the difference between asymmetric and symmetric encryption?
Symmetric encryption uses the same key to encrypt and decrypt, while asymmetric encryption requires a pair of keys using a public key to encrypt and a private key to decrypt the data.
What is the difference between UDP and TCP?
UDP (user datagram protocol) is a connectionless protocol.
TCP, on the other hand, is connection-oriented, best described as requiring a three-way handshake
What is an IPS, and how does it differ from IDS?
IPS (Intrusion Prevention System) can prevent traffic, while IDS (Intrusion Detection System) can only detect traffic.
What is encoding?
Encoding ensures that different systems or programs can correctly interpret data in its proper format
What is encryption?
Encryption ensures the data is secure and that only those with an encryption key have access to the data
What is hashing?
hashing maintains the integrity of the data
What is the CIA triad?
Model of security orders with 3 principles :
Confidentiality
Integrity
Availability
How do you keep updated with information security news?
Twitter and websites like bleepingcomputer.com
Ports to know : FTP
20/21
Ports to know : SMTP
25