Teacher Highlights Flashcards

1
Q

The model Microsoft uses for threat analysis and identification is called ___.

A

STRIDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does STRIDE stand for?

A
  • Spoofing
  • Tampering
  • Repudiation
  • Information disclosure
  • Denial of Service
  • Elevation of privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is spoofing?

A

Pretending to be something or someone other than yourself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is tampering?

A

Modifying something on a disk, network, memory, or elsewhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is repudiation?

A

Claiming you didn’t do something or were not responsible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is information disclosure?

A

Providing information to someone not authorized to have it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is denial of service?

A

Exhausting resources needed to provide services to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is elevation of privilege?

A

Allowing someone to do something they are not authorized to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ is an aggregation of compromised computers, turning them into robots used by attackers.

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of network attacks?

A

Denial of Service, Distributed Denial of Service, Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The following describes which network attack?

__ __ __ attacks are probably the nastiest, and most difficult to address. They are very easy to launch and often difficult (sometimes impossible) to track because of their timing. The intent is to send
more requests to a machine than it can handle, disrupting or even totally blocking user services.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

While a standard DoS attack comes from one computer, a __ __ __ __ attack, involves multiple computers sending requests, and is usually performed by a botnet.

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When it comes to Executing Commands Illicitly, there are two main classifications of users and their system access capability:

A

user access and administrator access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When it comes to Destructive Behavior, there are two major categories of break-ins and attacks:

A

Data Diddling and Data Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ ___ occurs when an attacker makes small changes or entries in records to change the original meaning. It is a form of computer fraud involving the intentional falsification of numbers in data entry.

A

Data Diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The term ___ ___ can be defined as the process of destroying the data stored on tapes, hard disks, and other forms of electronic media so that it is completely unreadable.

A

Data Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ is a non-technical or low-technology confidence trick (“con”) used for attacking information systems, often involving trickery or fraud.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two different types of phishing?

A

Spear Phishing and Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ ___ is a type of phishing that targets a specific group of individuals by sending messages that appeal to the group. Phishers may identify their targets by name using information collected from public sources such as social media.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

___ is a specific form of spear phishing targeted at high-value individuals, such as a CEO or company board member. This type of target provides an especially high payoff for potential attackers
due to the type and amount of information they have access to.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

___ techniques attempt to acquire sensitive data, such as bank account numbers, passwords, email accounts, etc., through fraudulent solicitation via email, text messages, or websites. A perpetrator masquerades as a legitimate business or reputable person, often broadcasting messages to a wide audience of targets or individuals within an organization or otherwise. Imagine a fisherman casting a line into the water with a baited hook waiting for a victim to bite.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___ tricks a victim by using their curiosity or greed against them. It encourages any user who happens to come across the bait to perform some action to trigger a trap, such as installing malware onto a device.

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Software is considered ___ because of the perceived intent of the creator rather than any features of the software itself.

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A ___ ___ is a type of virus planted on the system by installing a piece of software that contains some code that will not execute until a certain event occurs, such as a specific date.

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

___ is a type of malware that prevents or limits users from accessing their system. Attackers can encrypt a victim’s entire system, specific files, or they may lock the system’s screen until the victim pays a specified ransom to have their data unencrypted or unlocked by the attacker.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

___ software is your system’s protection against viruses. Your system can contract viruses from websites, e-mail attachments, etc. ___ programs inspect the contents of each file. They search for a virus signature, that is, specific patterns that match a malicious profile of something known to be harmful. For each file that matches a signature, the ___ program provides options on how to respond, such as removing the offending patterns, quarantining the file, or deleting the file.

A

Anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When it comes to countermeasures, what are the steps of the response phase of an attack?

A

Tasks such as defining the attack, informing users of the attack, contain the intrusion, identifying the source, notifying all interested parties (to include legal authorities), and compiling detailed repair reports for the entire affected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

___ ___ ___ refers to efforts to enhance the security of the supply chain, the transport and logistics system for the cargo. It combines traditional practices of supply-chain management with the security requirements driven by threats such as terrorism, piracy, and theft.

A

Supply chain security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Typical supply-chain security activities include:

A
  • Credentialing of participants in the supply chain.
  • Screening and validating of the contents of cargo being shipped.
  • Advance notification of the contents to the destination.
  • Ensuring the security of cargo while in-transit via the use of locks and tamper-proof seals.
  • Inspecting cargo on entry.
30
Q

Cloud computing is a powerful business solution because it allows an organization to save on hardware and management costs while maintaining high availability. However, cloud computing often relies on a third party to handle your data, which could include sensitive information. Ensuring the third party is securing this data is an important prerequisite when considering moving in-house services off-site and putting them into the hands of a third party.

A

Third Party Data Storage

31
Q

A third party in a supply chain is an intermediary, subcontracted individual, or company that provides a product or a service in support of the primary objectives of an organization. Support services can vary widely from janitorial services to software engineering, and more. Granting either ___ or ___ access to an organization’s information system, software code, or intellectual property can leave these assets vulnerable to exploitation through malicious actions or carelessness

A

physical or virtual

32
Q

___ ___ ___ is a wired and wireless network security solution that allows control of access based on predefined conditions that systems must meet prior to being granted access to a network. Any system not meeting the conditions may be directed to a restricted network that allows the user to become compliant and then gain access to the main network. The restricted network does not grant access to network resources.

A

Network Access Control (NAC)

33
Q

___ NAC utilizes software installed on clients which authenticates the client to the NAC for scanning before allowing network access. ___ NAC does not require agent software to be installed on a client. The authentication server will perform any required checks.

A

Agent-based
Agentless

34
Q

NAC agents can be ___, thereby continuously monitoring the system it’s installed on, or they can be ___. ___ agents are installed on the device when it attempts to connect to the network. After scanning the device for compliance, the ___ NAC will either remove itself immediately, or it may remain on the device until the device disconnects from the network

A

permanent
dissolvable

35
Q

However, the drawback to this authenticator is that if an account is compromised, a hacker can now access multiple servers rather than just one.

A

Single Sign On (SSO)

36
Q

Which authentication method is the following referring to?

With ____, clients can access a network remotely by connecting to a ____ client which sends an authentication request via User Datagram Protocol (UDP) to a ____ server which either verifies or rejects the credentials, thereby granting or denying access. The 802.1X protocol can be used in conjunction with ____ on wireless networks and switches that support it.

A

RADIUS

37
Q

Which authentication method is the following referring to?

___ is a newer AAA protocol that gives a more reliable and secure communication service through Transmission Control Protocol (TCP).

A

Diameter

38
Q

What are the six SDLC phases?

A
  1. Requirements Gathering and Analysis
  2. Design
  3. Implementation
  4. Testing
  5. Deployment
  6. Maintenance
39
Q

The code must be checked for functionality, that the application does what it’s designed to do. Developers should also input random invalid data into input fields to check for crashes, memory leaks, and other bugs. This process is known as fuzzing.

A

SDLC Phase “Testing”

40
Q

Best practices dictate that software developers provide ___ ___, ensuring that when data is entered into an application and buttons are pressed, the desired result happens. Ensure that no possible keyboard characters leave room for manipulation by hackers.

A

input validation

41
Q

Web sites and applications using ___ ____ can manipulate a system, obtaining full system access and potentially exploiting security vulnerabilities. On a Microsoft Internet browser, a user might be prompted to agree to run ___ ___. This practice should be discouraged.

A

ActiveX controls

42
Q

____ data puts the information in an unreadable format until
an authorized person decrypts the data, which places it back to cleartext ( a readable format).

A

File Encryption

43
Q

___ ___ ___ detects suspicious activity on a host or a network, logs it, and alerts system or network administrators.

A

Intrusion Detection System (IDS)

44
Q

___ ___ ___ monitor hosts or networks for suspicious activity and take corrective action.

A

Intrusion Prevention Systems (IPS)

45
Q

IDSs and IPSs can be either ____ (HIDS/HIPS) or ____ (NIDS/NIPS).

A

host-based
network-based

46
Q

___ ___ has the system digitally sign bootup files. Only digitally signed bootup files will run. This process prevents someone from booting up a different operating system to gain access.

A

Secure boot

47
Q

___ ___, or hardware encryption, applies very complex encryption more quickly than software encryption. Hardware encryption is done using chips physically installed in the system.

A

Device encryption

48
Q

When using Full Disk Encryption (FDE), a ____ stores cryptographic keys used to encrypt the data. On Windows-based OS’s, BitLocker utilizes TPM.

A

Trusted Platform Module (TPM)

49
Q

___ ___ ___ (HSM) Cryptographic processors can also be stored on a separate card that can be installed on a system. The HSM is an add-on device.

A

Hardware Security Module (HSM)

50
Q

The ___ ___ is responsible for receiving packets from the sensor or collector and then performing the analysis on the packets to determine if they are suspicious.

A

analysis engine

51
Q

The following describes which backup type?

This backup type backs up all files and folders. It does not rely on the archive bit to tell it what to backup, but it does clear the bit as each file is backed up. Restoring a ___ backup recovers all data that
may have been lost.

A

Full Backup

52
Q

The following describes which backup type?

___ backups back up everything that has changed since the most recent full backup. ____ backups do not clear the archive bit.

A

Differential Backup

53
Q

____ backups backup all data that has changed since the previous backup. ___ backups do clear the archive bit.

A

Incremental Backup

54
Q

What are the three configuration management benefits?

A
  1. Benefit 1: Disaster Recovery
  2. Benefit 2: Uptime and Site Reliability
  3. Benefit 3: Scalability
55
Q

The baseline configuration is the ___ ___ for all future baseline assessments.

A

starting point

56
Q

When it comes to backup methods, it is a good business practice to store data where?

A

offsite

57
Q

During a cyber incident process, how long do you have to determine if the event or incident AF Operational Reporting (OPREP-3) and/or
USSTRATCOM or USCYBERCOM Commander’s Critical Information Requirements (CCIR) reporting requirements?

A

within 1 hour

58
Q

The first thing to do to prepare for handling security incidents within your organization is to make sure that you have an incident response team in place (also known as a computer incident response
team (CIRT). The first step is to..?

A

Create the team

59
Q

Who are the four members typically found on a response team?

A
  1. Team Leader
  2. Technical Specialist
  3. Documentation Specialist
  4. Legal Advisor
60
Q

The ____ zone is designed for visitors to your office location. Visitors typically do not need access to the private network or even the extranet zone; they typically just need Internet access to check
email and surf the Internet.

A

Guest zone

61
Q

What are the three primary security zones?

A
  1. Private Zone - The Local Area Network resides in the private zone.
  2. Demilitarized Zone - The DMZ is an area between two firewalls
  3. Public Zone - The public zone is any network not controlled by the network administrator.
62
Q

There are two major classes of firewalls:

A

software-based and hardware-based

63
Q

NIDS is configured on the what?

A

Console

64
Q

Web sites store ___ (small text files) client computers that contain user preferences and logon information on. If the text file is accessed by someone else, they can see the information on it.

A

Cookies

65
Q

Files such as music, videos and software can be shared online between users using ____ applications, such as BitTorrent. This is a common method of transmitting malicious code.

A

Peer-to-peer (P2P) file sharing

66
Q

___ are used to automate processes on a computer and for generating web pages. This creates an application security issue
because ___ can make modifications to a system without user input.

A

Scripting

67
Q

Systems that provide centralization of authentication, authorization, and accounting are known as..?

A

Triple A (AAA)

68
Q

A RADIUS client sends an authentication request via..?

A

UDP

69
Q

Diameter is a newer AAA protocol that gives a more reliable and secure communication service through…?

A

TCP

70
Q

During which SDLC phase does the following apply to?

The code must be checked for functionality, that the application does what it’s designed to do. Developers should also input random invalid data into input fields to check for crashes, memory leaks, and other bugs. This process is known as fuzzing.

A

Testing