Ucertify Exam Prep Flashcards

1
Q

The threat intelligence cycle is a five-step process. Here are the five steps of the threat intelligence cycle:

A
Requirements gathering
Data collection
Data processing and analysis:
Intelligence dissemination: 
Feedback:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1-Requirements gathering:

A

Assess what security breaches or compromises a user faced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2-Data collection:

A

Collect data from threat intelligence sources to meet intelligence requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3-Data processing and analysis:

A

Process data to allow it to be consumed by whatever tools or processes a user intends to use and then the user must analyze data itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4-Intelligence dissemination:

A

Distribute data to leadership and operational personnel who will use data as part of their security operations role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

5-Feedback:

A

Gather feedback about reports and data users have gathered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following open ports represents the most significant possible security vulnerability?
A 23
B 22
C 443
D 161
A

Port 23 is used by Telnet, which is an insecure unencrypted communications protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ________ is a specialized tool used to find WPA and WPA2 passphrases specifically on networks that support the WPS feature.

A

reaver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can be used to write a checklist and report results in a standardized fashion?

A

Extensible Configuration Checklist Description Format (XCCDF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data loss prevention (DLP) may be able to intercept and block unencrypted sensitive information, leaving the webserver but it does not

A

apply cryptography to web communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Packet sniffing monitors only the headers of packets to determine

A

what type of traffic is being sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Flow sends information about

A

all connections or sends a sampled dataset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNMP allows network devices to

A

send information about important events as SNMP traps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

During which phase of the software development life cycle (SDLC) model does user acceptance testing (UAT) occur?

A

testing and integration phase of the software development life cycle (SDLC) model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__________ is a form of structured and formal code review intended to find a variety of problems during the development process of the code.

A

Fagan inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___________ provides a searchable listing of vulnerable hosts, including details of the system that was scanned.

A

Shodan search engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A _____________________ is a document that defines a bilateral or multilateral agreement between two parties

A

memorandum of understanding (MOU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Succession planning is a security control that is designed to provide

A

continuity for security responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The ALE value of a specific risk is calculated by multiplying an SLE by its ARO to determine the financial magnitude of this risk on an annual basis. Here’s the formula for calculating ALE:

A

ALE (annual loss expectancy) = SLE (single loss expectancy) X ARO (annual rate of occurrence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

________________ allows a user to deploy, configure, and manage data centers through scripts

A

Infrastructure as code (IaC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Resource servers handle authenticated requests after the application has

A

obtained an access token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___________ analysis methods run potential malware applications and detect threats based on their behavior. This is good for zero day attacks

A

Heuristic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which protocol provides an encryption key and a digital signature that verifies that an email message was not forged or altered?

A. LDAP
B. DKIM
C. HTTPS
D. IPSecc

A

The DomainKeys Identified Mail (DKIM) protocol provides an encryption key and a digital signature that verifies that an email message was not forged or altered.

24
Q

A qualitative risk assessment ranks the potential of a threat and sensitivity of assets

A

by grade or scale such as low, medium, or high.

25
Q

quantitative risk assessment

A

measure threat exposure and likelihood with cost-based metrics.

26
Q

Tamper-proof seals are used when it is necessary to prove that devices, systems, or spaces were not

A

accessed during your absence. They often include holographic logos that help to ensure that tampering is visible and cannot be easily hidden by replacing a logo.

27
Q

Hashcat tool is a password-cracking utility that uses

A

graphics processing units (GPUs) to crack passwords at a very high rate of speed.

28
Q

Sysinternals is a tool that includes resources and utilities Microsoft Windows environment.

A

to manage, diagnose, troubleshoot, and monitor a

29
Q

____________ is unauthorized equipment that is attached to a network or assets which create a side channel for an attack. I

A

Rogue hardware

30
Q

Accidental Threat

A

31
Q

Physical Threat

A

32
Q

Structural Threat

A

Resource exhaustion is a type of structural threat

33
Q

SIFT SANS Investigative Forensic Tool Kit

A

34
Q

Fagan Inspection

A

Formal Code review process

35
Q

Mutation Testing

A

36
Q

It allows cloud customers for the serverless application architecture. It is used to execute or trigger functions written by developers. It offers Amazon’s Lambda services. Which Cloud Service is this?

A

function as a service (FaaS)

37
Q

OWASP

A

38
Q

Which of the following statements are true of proper compensating controls?

A

They must meet the intent and rigor of the original requirement.

They must provide a similar level of defense as the original requirement.

They must be “above and beyond” other PCI DSS procedures.

39
Q

In a pent test the _______ coordinates the exercise and serves as referees, arbitrating disputes between the team, maintaining the technical environment, and monitoring the results.

A

white team

40
Q

The ________________ identifies potentially malicious external domains. ACLs can permit and deny traffics for a virtual machine endpoint.

A

access control list (ACL)

41
Q

Secure Shell (SSH), uses port

A

22

42
Q

database servers commonly run on ports

A

1433 (for Microsoft SQL Server),

43
Q

Remote Desktop Protocol (RDP) services run on port.

A

3389

44
Q

The _______model is a sequential model in which each phase is followed by the next phase. In this model, phases do not overlap and each logically leads to the next.

A

waterfall

45
Q

The _____ model, which is an extension of the Waterfall model, pairs a testing phase with each development stage. Each phase starts only after the testing for the previous phase is done.

A

V model

46
Q

The _______________ model doesn’t focus on any planning or a process. It focuses on making resources available and simply starting coding based on requirements as they are revealed.

A

big bang model

47
Q

The _______________act is a United States law that requires publicly traded companies to have proper internal control structures in place to validate that their financial statements accurately reflect their financial results. SOX

A

Sarbanes-Oxley (SOX)

48
Q

______ scanner is a commercial network vulnerability scanner that offers a unique deployment model using the software-as-a-service (SaaS) management console to run scans using appliances located both in on-premises datacenters and the cloud.

A

Qualys’s vulnerability

49
Q

__________ is an agile software development technique that places two developers at one workstation. One developer writes code, while the other developer reviews their code as they write it.

A

Pair programming

50
Q

Protected ______ ____________ (PHI)

A

Protected health information

51
Q

____ ______ ________allows administrators to specify which hosts are allowed to send email messages from a given domain by creating a specific SPF record in the Domain Name System (DNS).

A

Sender Policy Framework (SPF)

52
Q

NIST recommends using the following four categories to describe the functional impact of an incident:

None: No effect on an organization’s ability to provide all services to all users.

Low: Minimal effect an organization can still provide all critical services to all users but has lost efficiency.

Medium: An organization has lost the ability to provide a critical service to a subset of system users.

High: An organization is no longer able to provide some critical services to any users.

A

None: No effect on an organization’s ability to provide all services to all users.

Low: Minimal effect an organization can still provide all critical services to all users but has lost efficiency.

Medium: An organization has lost the ability to provide a critical service to a subset of system users.

High: An organization is no longer able to provide some critical services to any users.

53
Q

________ for scanning a hard drive to view the deleted communication

A

Forensic Toolkit (FTK)

54
Q

Tools in the _________ suite can capture packets from wireless networks, conduct packet injection attacks, and crack preshared keys used on wireless networks

Ettercap
Wireshark
Aircrack-ng
Wifiphisher

A

aircrack-ng

55
Q

____ _______ is a process of extracting data from a computer when that data has no associated file system metadata

A

File carving

56
Q

_______ can be used to open connections to both the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) ports and services running on those ports.

Traceroute
Netstat
Netcat
TCPConn

A

Netcat

57
Q

Common Configuration Enumeration

A