Things I had to improve on Flashcards

1
Q

DEP

A

Data execution protection - stops data from executing from memory. Only data can be stored read/write, no exe.Built into windows, useful for buffer overflow attacks etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the history of firewalls specifically that leading up to next-gen?

A

1st gen stateless, 2nd gen stateful, 3rd gen, both with added OSI model benefits, deep packet filtering, application firewalls, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can be used to segment a network?

A

A switch, router,SDN, VLAN, Firewall can all segment a network. Hubs cannot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC filtering occurs on which layer of the OSI model?

A

The data link layer (layer 2) deals with MAC addresses, whereas layer 3 (network layer) deals with IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port scanning, what best describes this type of penetration testing?

A

Active reconnaissance as it can be invasive - because it is engaging with the system (not that it is invading)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the hallmark of an APT?

A

Advanced persistant threat - to stay in a system as long as possible unnoticed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

White vs Grey vs Black box

A

White - Full knowledge of internal systems
Grey - Some knowledge, possibly an employee
Black - unethical hacker no knowledge at allo information at all, not even OS etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CSS vs CSRF vs SQL Injection

A

CSS uses script embedded into the webpage which the user then trusts and loads. It can be reflected or stored.

CSRF - code is created to perform a request on behalf of the user, user’s trust with website is taken advantage of, their session can be used to authenticate. Link is sent. A link is usually crafted to look genuine “Wow I found this picture of you”

SQL injection - injection based on an SQL database to achieve a goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does amplification refer to? (as an attack)

A

DDoS attack that uses public DNS servers to flood target servers with DNS response traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different hypervisors and their security?

A

Type 1 - firmware based, relies on the physical hardware, is far more secure. Not OS dependant
Type 2 - Software based, goes ontop of the OS, less secure, more for end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the five developmental environments?

A

Dev, test, staging, prod, QA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is EAP? and list a few

A

Extensible authentication protocol, used for authentication networks and internet connections.
EAP-LEAP (can catch, not that secure, uses MSCHAP)
EAP-FAST (faster than leap, more secure)
EAP-PEAP protected EAP
EAP-TTLS (Tunneled TLS - JUSTSERVER)
EAP-TLS (more secure, sever+client certificates)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RADIUS vs TACACS+ (what are they how are they different)

A

Authentication protocols. Remote auth. dial-in user service (RADIUS) mainly for network access protocol for user auth..
Only really encrypts passwords.

TACACS - authenticates network devices not just user accounts. Administers network devices like routers and switches. Fully encrypts packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is OPENID?

A

OpenID is built on Oauth to help with SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Order of data volitility?

A

Data in memory always most volatile. Such as CPU registers, caches, & system RAM. In that order. Then disks, tapes, remote logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A