Ucertify Exam Prep Flashcards
The threat intelligence cycle is a five-step process. Here are the five steps of the threat intelligence cycle:
Requirements gathering Data collection Data processing and analysis: Intelligence dissemination: Feedback:
1-Requirements gathering:
Assess what security breaches or compromises a user faced.
2-Data collection:
Collect data from threat intelligence sources to meet intelligence requirements.
3-Data processing and analysis:
Process data to allow it to be consumed by whatever tools or processes a user intends to use and then the user must analyze data itself.
4-Intelligence dissemination:
Distribute data to leadership and operational personnel who will use data as part of their security operations role.
5-Feedback:
Gather feedback about reports and data users have gathered.
Which of the following open ports represents the most significant possible security vulnerability? A 23 B 22 C 443 D 161
Port 23 is used by Telnet, which is an insecure unencrypted communications protocol.
A ________ is a specialized tool used to find WPA and WPA2 passphrases specifically on networks that support the WPS feature.
reaver
What can be used to write a checklist and report results in a standardized fashion?
Extensible Configuration Checklist Description Format (XCCDF)
Data loss prevention (DLP) may be able to intercept and block unencrypted sensitive information, leaving the webserver but it does not
apply cryptography to web communications.
Packet sniffing monitors only the headers of packets to determine
what type of traffic is being sent.
Flow sends information about
all connections or sends a sampled dataset.
SNMP allows network devices to
send information about important events as SNMP traps.
During which phase of the software development life cycle (SDLC) model does user acceptance testing (UAT) occur?
testing and integration phase of the software development life cycle (SDLC) model
__________ is a form of structured and formal code review intended to find a variety of problems during the development process of the code.
Fagan inspection
___________ provides a searchable listing of vulnerable hosts, including details of the system that was scanned.
Shodan search engine
A _____________________ is a document that defines a bilateral or multilateral agreement between two parties
memorandum of understanding (MOU)
Succession planning is a security control that is designed to provide
continuity for security responsibilities.
The ALE value of a specific risk is calculated by multiplying an SLE by its ARO to determine the financial magnitude of this risk on an annual basis. Here’s the formula for calculating ALE:
ALE (annual loss expectancy) = SLE (single loss expectancy) X ARO (annual rate of occurrence)
________________ allows a user to deploy, configure, and manage data centers through scripts
Infrastructure as code (IaC)
Resource servers handle authenticated requests after the application has
obtained an access token
___________ analysis methods run potential malware applications and detect threats based on their behavior. This is good for zero day attacks
Heuristic analysis