Usually Forget

0.0(0)
studied byStudied by 1 person
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/156

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

157 Terms

1
New cards

WPS

Wifi Protected Setup - deprecated

2
New cards

Bluesmacking

Bluetooth DOS

3
New cards

BlueJacking

sending unsolicited messages to bluetooth

4
New cards

BlueSnarfing

Unauthorized access to bluetooth

5
New cards

Bluebugging

Gaining remote control of bluetooth device

6
New cards

Wireless disassociation

Dos attack on wireless devices & AP with de authentication frame

7
New cards

IV attack

WEP vulnerability-based wireless attack

8
New cards

Pass the hash 

authenticate to remote server w/o extracting clear text password from digest

9
New cards

Geofencing

Tech that provides control over usage of mobile devices within a designated area

10
New cards

UPS

Uninterrupted power service for short term power backup

11
New cards

PIN

bluetooth pairing security

12
New cards

EAP-TLS

deprecated wireless authentication protocol by Cisco

13
New cards

PEAP

Protected EAP

14
New cards

LEAP

wireless LAN EAP by Cisco

15
New cards

SEH

Structured Exception Handling - Windows specific

16
New cards

AIS

Automated Indicator Sharing - Initiative by US gov for real time sharing of cyber threat indicators

17
New cards

TTP

Tactics, techniques, and procedures

18
New cards

FRR

False Rejection Rate

19
New cards

AML/KYC

Anti Money Laundering/Know your customer 

20
New cards

Netflow

Tool for Network monitoring and analyzing

21
New cards

UTM

Unified threat management

22
New cards

Legal Holds

Process of securing and preserving evidence for a security incident

23
New cards

Common Signs of Insider Threat

Unusual Data transfers & frequent unauthorized access

24
New cards

Pros of using Agent

Consistent, more detailed info about client

25
New cards

Pros of Agentless

Uses less memory & supported by wide range of devices

26
New cards

Attestation

Verifying integrity, authenticity, & affirming the accuracy and completeness of compliance reports

27
New cards

DKIM

protocol that uses a cryptographic signature to associate the domain name with an email

28
New cards

MTA

Mail transfer Agent → transfer/route emails between servers

29
New cards

DMARC

Specify policies on how to handle mail that doesn’t authenticate

30
New cards

SPF

Sender Policy Framework → which emails are authorized to send emails

31
New cards

FIDO

Fast Identity Online → Passwordless authentication

32
New cards

SMTP

Send emails

33
New cards

IMAP

open service port that is commonly used for email clients to retrieve emails - commonly used to perform eavesdropping, data theft, or malware delivery attacks

34
New cards

POP3

open service port that is commonly used for email clients to retrieve email messages from a server - commonly used to perform eavesdropping, data theft, or malware delivery attacks

35
New cards

Virtual Desktop Infrastructure

Hosts desktop env. on central server to allow users to connect from any device

36
New cards

SASE

Secure Access Service Edge → Cloud-native framework to converge WAN w/ security control

37
New cards

Port 20/21

FTP Port

38
New cards

Port 23

Telnet Port

39
New cards

Port 25

SMTP Port

40
New cards

Port 53

DNS Port

41
New cards

Port 88

tcp/udp - Kerberos authentication service port

42
New cards

Port 389

LDAP Port

43
New cards

Port 636

LDAPS Port

44
New cards

Port 3389

RDP Port

45
New cards

Port 5060

VoIP Port

46
New cards

DAC

Based on user identity

47
New cards

Port Security

regulates based on physical addresses

48
New cards

ICS/SCADA

Industrial Control System

49
New cards

HMI

Human Machine Interface → allows direct operator access in ICS

50
New cards

PLC

Programmable Logic Controllers → Embedded devices connecting to actuators & sensors

51
New cards

Distributed Control Systems

Real-time info & remote system control

52
New cards

Chain of Custody

Securing and preserving evidence for a security incident for use in legal proceedings

53
New cards

Replication

Create copies of data in real-time/near real-time

54
New cards

Ephemeral

lasting for a temporary time

55
New cards

Port 1433

Micorsoft SQL Server Port

56
New cards

SNMP

Simple Network Management Protocol → managing and monitoring network devices and enables the sending and receiving alerts about performance and status

57
New cards

Watering Hole

Compromising and EXISTING website

58
New cards

802.1X

governs port based network access with EAP based exchange(use with RADIUS protocol for authentication)

59
New cards

Jailbreaking vs rooting vs sideloading

Jailbreaking is to pass software restrictions for IOS, rooting is jailbreaking for android, sideloading is downloading unverified apps

60
New cards

Differential backups

What’s different - Saving data changed since the last full backup

61
New cards

EF

impact on ASSET VALUE

62
New cards

enumeration

tracking equipment and access controls

63
New cards

audit committee

Overseeing an organization's internal controls and financial reporting

64
New cards

checksum

like hashing to detect accidental data corruption

65
New cards

reflected attack

attacker spoofs the source IP address of a victim to send a request to a third-party server, causing the server to respond to the victim instead of the attacker

66
New cards

Risk analysis

determine financial impact of specific risks

67
New cards

Risk assessment

evaluating and prioritizing identified risks based on their potential impact and likelihood of occurrence

68
New cards

Pros/Cons Microservices

Ability to Scale/Complexity of interactions

69
New cards

Baselines

Configuration

70
New cards

What system is integrated into larger/more complicated systems?

embedded systems

71
New cards

How to secure embedded systems ?

RTOS

72
New cards

Which of the following statements BEST explains the importance of automating resource provisioning?

It helps in rapid scaling of resources based on demand

73
New cards

Cons of NGFW

not optimized for high throughput

74
New cards

SWG

Secure web gateways

75
New cards

Espionage

cyber spying

76
New cards

CVE format

2022-12345

77
New cards

CVSS format

10.0-AV:N/AC:L/PR:N/UI:N

78
New cards

Hubs

Layer 1 - broadcasting data to all connected devices without security features

79
New cards

Switches and bridges

data link layer (Layer 2) - suitable for internal network traffic but lack the routing capabilities and access controls

80
New cards

Routers

Network Layer(Layer 3) - implement access control policies and use routing protocols to ensure data confidentiality

81
New cards

DLP systems

can take corrective and preventative actions, such as alerting administrators or blocking user actions and implements data security policies

82
New cards

Failovers

temporary means to prevent complete failure

83
New cards

Which of the following statements BEST explains the importance of training employees about the incident response process?

Training ensures that incident response team members quickly react to an incident

84
New cards

Credential replay

attackers reusing previously captured user credentials to gain unauthorized accessSCADA

85
New cards

SCADA cons

Limited security update capabilities

86
New cards

cons of embedded or real-time systems

Memory constraints

87
New cards

replay attack

application attack that involves capturing and retransmitting data

88
New cards

Environmental variables

the unique characteristics of an organization's infrastructure that can affect vulnerability assessments and risk analysis

89
New cards

COPE

Corporate Owned Personally Enabled

90
New cards

COBE

Corporate Owned Business Only

91
New cards

credential stuffing attack

automated attack that uses a list of usernames-passwords from one breach on a lot of other websites

92
New cards

Control plane

To enforce security policies across the network

93
New cards

Data plane

To process and transmit data between systems

94
New cards

Which of the following activities is MOST crucial for ensuring that known vulnerabilities in software or hardware are addressed before they can be exploited by attackers?

Applying security updates

95
New cards

How does NGFW interact with applications ?

add security by identifying and blocking malicious content at the application layer; does NOT specifically block known harmful websites

96
New cards

Root of Trust

can be a piece of hardware or software based

97
New cards

FIPS

- specifies requirements for cryptographic modules used within federal computer systems

98
New cards

ISO/IEC 27001

standard for information security management systems

99
New cards

NIST Special Publication 800-63

provides guidelines for digital identity

100
New cards

QoS

prioritize network traffic and allocate bandwidth based on different criteria, such as application type or data type