Various Concepts Flashcards

1
Q

software based client that monitors data in use on a computer and can stop file transfers or alert admins of the transfers base on a set of rules or policies.

A

Endpoint dlp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

software or hardware solution installed on the perimeter of the network to protect data in transit.

A

Network dlp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

software stored on servers in a data center to protect data at rest.

A

Storage dlp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software to protect data being stored in cloud services, usually a SaaS solution.

A

Cloud dlp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UEBA

A

User and Entity Behavior Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SCCM

A

System Center Configuration Management - Microsoft software management system for admin device management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

trusted program to ensure that microprocessors in the supply chain are secure and is overseen by the Department of Defense

A

Trusted Foundry Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

process of ensuring that hardware is procured tamper free from a trusted supplier.

A

Hardware Source Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

cryptographic module embedded within a computer system that can endorse trusted execution and can attest to boot settings and metrics

A

Root of Trust - ROT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PUF

A

Physically Unclonable Function - anti tamper mechanism used inside systems (ROT policies).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

UEFI feature that prevents unwanted process from executing during the boot process.

A

Secure Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UEFI feature that gathers secure metrics to validate the boot processes in an attestation report.

A

Measured Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A claim that the data presented is valid by digitally signing it using a TPM’s private key.

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A means for software or firmware to permanently alter the state of a transistor on a computer chip.

A

eFuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

an update digitally signed by the vendor.

A

Trusted Firmware Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

low-level CPU changes and instructions that ensure secure processing and are built into the microprocessor.

A

Processor Security Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AMD chip PSEs

A
  • SME Secure Memory Encryption
  • SEV Secure Encrypted Virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Intel chip PSEs

A
  • TXT Trusted Execution Technology
  • SGX Software Guard Extensions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

extensions that allow a trusted process to create an encrypted container for sensitive data.

A

Secure Enclave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

operations that should only be performed once or not at all.

A

Atomic Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

key signature of a directory traversal attack

A

../../ or dot dot slash and %255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

key signature of a SQL attack

A

’ or 1 = 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

occurs when an attacker is able to execute run commands physically on a victim computer

A

Arbitrary Code Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

occurs when an attacker is able to execute run commands on a victim computer remotely

A

RCE Remote Code Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

occurs when an attacker fills up the buffer with NOP (nonoperation instruction) so that the return address may hit a NOP and continue until it finds the attacker’s code to run

A

smash the stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

User’s web browser is exploited by the attacker, usually by a compromised web server

A

XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The web page is exploited the user’s browser. User is already authenticated, then the attacker uses that trust to exploit the web site.

A

XSRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Hosts or servers located in the DMZ that do not have any services configured to run on the local network.

A

Bastion Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

secures the network by keeping the machines behind it anonymous while web surfing. Uses NAT.

A

IP Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Attempts to serve clients content itself without contacting the remote server.

A

Caching Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Used to prevent devices from connecting to prohibited websites and other content.

A

Internet Content Filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A go between device that scans for viruses, filters content, and performs dlp functions.

A

Web Secure Gateway WSG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Low upfront cloud storage solutions, but exorbitant fees to move the data from the cloud to another provider or on prem solution due to bandwidth and storage costs to transfer the large amounts of data

A

Vendor Lockin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Security appliance set up at the client network edge to forward traffic to the cloud network if the content complies with the policies.

A

Forward Proxy: Users can evade forward proxies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A security appliance set up at the cloud network edge that forwards content if it complies with policy. Cloud provider must support this to work.

A

Reverse Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

FAAS

A

Function as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A software architecture that runs functions within virtualized containers at runtime instead of on dedicated servers.

A

Serverless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

AWS storage containers

A

Buckets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Microsoft azure storage containers

A

Blobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CORS

A

Cross Origin Resource Sharing. A network policy that allows the browser to treat content from nominated domains as safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

DoS attack which attempts to send more packets to a device/server than it can handle.

A

Flood Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A flood/dos attack using ICMP pings.

A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

attacker sends a ping to a subnet broadcast address and the devices reply to a spoofed ip address (victim’s server) using bandwidth and power.

A

Smurf Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

flood attack using udp packets to flood the target device.

A

Fraggle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

DOS attack where the attacker initiates multiple TCP sessions but does not complete the three way handshake. Flood Guards are used to prevent these attacks.

A

SYN FLOOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

a network scan attack that sets the FIN, PSH, and URG flags that can cause a system to crash.

A

XMAS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

breaks apart packets into IP fragments and modifies them with oversized payloads and sends them to a victim machine.

A

Teardrop Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

exploits a security flaw to permanently break a device by reflashing its firmware.

A

Permanent DOS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

attack that creates a large number of resources to use up the available processing power of the device

A

Fork Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

If A=B=C, then A=C: If any trusted network is compromised, all trusted networks are also.

A

Transitive attack

51
Q

name resolution info is modified in the DNS server’s cache

A

DNS Poisoning

52
Q

DNS attack where the attacker requests copies of the DNS info (server names, ip info) to their system for future attacks

A

Unauthorized Zone transfer

53
Q

DNS attack where the attacker modifies the host file to have the client bypass the dns server and redirects to a malicious site.

A

Altered Host File

54
Q

occurs when an attacker redirects one website’s traffic to another bogus/malicious website.

A

Pharming

55
Q

exploits the process in how dns names are registered and prevents domain names from being registered.

A

Domain Name Kiting

56
Q

Key differences between WEP, WPA, WPA2, and open networks

A

: open=no security. WEP = weak IV, WPA = TKIP and RC4, WPA2 = CCMP and AES,

57
Q

key components of the two WPA3 modes

A

WPA3(Enterprise Mode) AES-256 W/SHA-384 hash (Personal Mode) CCMP128 key and uses PFS instead of PSK

58
Q

Class A Fire Suppression base, use, and symbol

A

Water, ordinary combustibles, and green triangle w/A

59
Q

Class B Fire Suppression base, use, and symbol

A

Dry chemical or CO2, flammable gasses and liquids, red square withB

60
Q

Class C Fire Suppression base, use, and symbol

A

CO2, electrical fires, blue circle w/C

61
Q

Class D Fire Suppression base, use, and symbol

A

dry powder blend, combustible metals, yellow pentagon w/a D

62
Q

Class K Fire Suppression base, use, and symbol

A

Potassium based, cooking oils and animal fats, black hexagon with a K

63
Q

Location of HVAC hot and cold isles.

A

Cold isles front of rack, hot isles at rear of rack

64
Q

shielding installed around an entire room to prevent electromagnetic energy from entering or exiting the area.

A

Faraday Cage

65
Q

U.S. Government standards for the level of shielding required in a building to ensure emissions and interference cannot enter or exit the facility.

A

Tempest

66
Q

CAN

A

Controller Area Network – a digital serial data communications network used in vehicles.

67
Q

OBD-2

A

Onboard Diagnostics module – external interface for CAN networks

68
Q

describe 3 CAN vulnerabilities

A

Attach the exploit to the OBD-2, exploit over onboard cellular, or over onboard wifi

69
Q

Main difference between SoC and FPGA

A

SoC cant be changed, FPGA can be changed as needed.

70
Q

Digital serial data connections used in operation technology networks to link PLCs

A

Fieldbus

71
Q

input and output controls on a PLC that allow a user to configure and monitor the system.

A

HMI Human Machine Interface

72
Q

software that catalogs and aggregates data from multiple sources within an ICS

A

Data Historian

73
Q

Key difference between ICS and SCADA

A

ICS = single location, SCADA multi point of a geographical region.

74
Q

communications protocol used in operational technology networks

A

Modbus

75
Q

4 key controls for mitigating vulnerabilities in specialized systems (ISC & SCADA):

A
  1. Establish admin control by recruiting staff w/relevant expertise.
  2. Implemint minimum links by disconnecting unnecessary services, protocols, etc.
  3. Develop and test a patch management program for OT networks.
  4. Perform regular audits of logical and physical access to these systems.
76
Q

BAS

A

Building Automation System

77
Q

utilizes a web of trust between organizations where each one certifies others in the federation. Not efficient for large network of organizations.

A

Cross-Certification authentication

78
Q

Organizations authorize based on a single third-party organization. More efficient.

A

Trusted Third Party(bridge model)

79
Q

Users log in to an Identity Provider(IP) and uses their account at Relying Parties (RP). Largest is google.

A

Open ID

80
Q

IEEE Standardized framework used for port based authentication for both wired and wireless networks.

A

802.1x

81
Q

application layer protocol for accessing and modifying directory services. Used in MS AD.

A

LDAP

82
Q

what is the supplicant in the 802.1x process

A

pc, client, etc.

83
Q

The device through which the supplicant is attempting to access the network(switches, vpn concentrators, etc.). 802.1x process

A

Authenticator

84
Q

The centralized device that performs the authentication (RADIAUS, TACACS, etc. servers) . 802.1x

A

authentication server

85
Q

A standardized framework of protocols that allows for many methods of authentication including passwords, PKI, and digital certificates.

A

EAP

86
Q

uses simple passwords, CHAP for authentication, and a 1 way process.

A

EAP MD5

87
Q

uses PKI and digital certificates for mutual authentication (2 way).

A

EAP TLS

88
Q

requires server-side digital certificates and a client-side password for mutual authentication.

A

EAP TTLS

89
Q

uses protected access credentials (a security credential generated by the server that holds information specific to a peer) instead of digital certificates for mutual authentication.

A

EAP FAST

90
Q

uses server certificates and MS Active Directory databases to authenticate a client’s password.

A

PEAP

91
Q

Cisco’s proprietary authentication protocol requiring Cisco based networks.

A

LEAP

92
Q

Cross platform version of RDP(MS only) for remote user GUI access.

A

Virtual Network Computing (VNC)

93
Q

specialized hardware device that allows for hundreds of simultaneous vpn connections from remote devices.

A

vpn concentrator

94
Q

a remote worker’s machine diverts internal traffic(file transer, email, etc.) over a vpn and external traffic over their own internet connection.

A

Split tunneling

95
Q

Cisco’s proprietary version of RADIUS and is not available for cross platform use..

A

TACACS+

96
Q

attack that intercepts API calls between the browser process and its DLLs.

A

MITB Man in the Browser

97
Q

brute force attack where stolen names and passwords are tried against multiple websites.

A

Credential Stuffing

98
Q

software vulnerability where the authentication mechanism allows an attacker to gain entry.

A

Broken Authentication

99
Q

the access control policy is determined by the owner.

A

DAC

100
Q

the computer systems determine the access control policies for an object. Military, top secret, secret, etc. Lattice and Rule based are MAC models.

A

MAC

101
Q

uses a set of permissions instead of labels in MAC.

A

RBAC - Role Based

102
Q

if/then access control. If Jason is in HR, then give access to HR files.

A

Attribute based

103
Q

requires more than one person to conduct a sensitive task or operation.

A

Separation of Duties

104
Q

ADUC

A

Active Directory Users and Computers

105
Q

3 Types of Linux user permissions

A

U = owners, G = groups, and O or A = all users.

106
Q

used to change permissions or rights of a file of folder system in linux.

A

chmod change mode

107
Q

Linux numeric value for R,W, and X

A

: 4(R) = read, 2(W)= write, 1(X) = Execute. (binary values) Add to combine, 6=rw, 3 = wx, etc.

108
Q

occurs when permissions are passed to a subfolder from the parent through inheritance.

A

Propagation

109
Q

Two most popular password crackers

A

Cain and Able & John the Ripper

110
Q

Attack method where a program attempts to guess a password by using a list of possible passwords.

A

Dictionary attack

111
Q

Attack method where a program attempts to try every possible combination until the password has been compromised.

A

Brute Force Attack

112
Q

attack method that compares a precomputed encrypted password to a value in a lookup table.

A

Cryptanalysis Attack

113
Q

A list of precomputed values (hashes) to more quickly break a password.

A

Rainbow table

114
Q

network traffic is analyzed to discover predetermined attack patterns.

A

Signature-based monitoring

115
Q

network traffic is analyzed to discover traffic that is outside of an established baseline.

A

Anomaly-based monitoring

116
Q

network traffic is analyzed to discover data that does not match previous network activity, applications, etc.

A

Behavior-based monitoring

117
Q

Windows program for performance monitoring.

A

perfmon.exe (perfmon in cmd will load)

118
Q

2 Protocol analyzer modes

A

Promiscuous and Non-Promiscuous modes

119
Q

Network adaptor captures all traffic on the network regardless of the MAC address on the frames carrying them.

A

Promiscuous Mode

120
Q

Network adaptor only captures traffic directly addressed to itself.

A

Non-promiscuous mode

121
Q

Data files that contain the accounting and audit trail for actions performed by a user on the computer or network.

A

Logs

122
Q

Logs the events such as successful and unsuccessful user logons to the system.

A

Security Logs

123
Q

Logs the events such as a system shutdown or driver failure.

A

System Logs

124
Q

Logs the events for the operating system and third party applications.

A

Application Logs