Cyber security exam 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/124

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

125 Terms

1
New cards

What are two main types of intrusion detection systems

Network based and host based

2
New cards

Which of the following is not a capability of network based IDS

It cannot decrypt or read encrypted traffic

3
New cards

What are honeypots

A system simulating traffic to attract attackers

4
New cards

Connecting to a server and sending a request to identify a version is what?

Banner grabbing

5
New cards

What is IPS

Intrusion Prevention system

6
New cards

NIDS

Network intrusion Detection System, this collects traffic

7
New cards

System used to consolidate security analytics from several sources and identity pattterns

SIEM - Security and Information Event Systems

8
New cards

What is wireshark?

A protcol analyzer

9
New cards

Software that merely listens to traffic and does not create traffic is what

Passive

10
New cards

Anomalies in privilaged user account activity are

Indicators of compromise

11
New cards

Small software update to address an urgent or specific problem is called

Hotfix

12
New cards

In a UNIX OS, which runlevel describes single user mode?

1E

13
New cards

File permissions under UNIX consists of what three types?

Read, write, executeE

14
New cards

What is the mechanism that allows for centrailized mamagnment and configuration of computers and remote users in AD evniorment called?

Group policies

15
New cards

Updating software loaded on a nonvolatile RAM is called

Firmware update

16
New cards

Shadow file on a UNIX system contains what

Password associated with user account

17
New cards

Firmware implementation on modern PC hardware is

UEFI - Unified extensible firmware Interface

18
New cards

Software designed to prevent damage from malicous software or files

Antivirus software

19
New cards

SYN Flood is example of what attack

Denial of service attack

20
New cards

An attack which attaker listens to traffic across a network, wants to view passwords or user id’s

Sniffing attack

21
New cards

Which attack takes advantage of trusted relationship between two systems

Spoofing

22
New cards

What type of attack does an attacker re-send series of commands and codes used in a finacial transaction to cause transaction to be conducted multiple times

Replay

23
New cards

An attack which attacker attemps to lie and misrepresent themselves in order to gain access to info that can be useful in an attack

Social engineering

24
New cards

Attack that is designed to deny system access to its files and spread across a network causing destruction

Ransomware

25
New cards

Example of attack that can compromise confidentiality of communications following exchange of public keys over an untrusted network

Man in the middle attack

26
New cards

Best way to minimize possible avenues of attack for your system

ensure all patches have been downloaded that system offers

27
New cards

War driving attack is a attempt to exploit what

Wireless networks

28
New cards

Malicious code that is set to execute its payload on specific date or time is known as

A time bomb

29
New cards

To secure communications during remote access use..

SSH

30
New cards

Which of the following is not a packet capture tool

dd

31
New cards

If performing tests of system with no knowledge of internal workings of system

Black box testing

32
New cards

Tool not used for ip investigations

Chmod, linux permissions

33
New cards

to search system to find files containing a phrase, what tool what be best to use?

Grep

34
New cards

routine audits do not typically audit

Virus code

35
New cards

Used to anazlyze previosly collected packets data on a network, editing some data as well

tcpreplay

36
New cards

Not used in penetration testing

Cuckoo

37
New cards

Kind of vulnerability is never mitigated by patching software

Zero Day

38
New cards

Biggest reasons why spam is prevalent today

The use of zombie botnets

39
New cards

What does keyword secure in a cookie do

Prevents the cookie from passing over HTTP connections

40
New cards

Why is an open email relay bad

It will allow anyone to send spam through the server

41
New cards

Code signing

Provides method to demonstrate code integrity

42
New cards

Why is HTML e-mail dangerous

Allows the launching of malicous code from preview pane

43
New cards

What kind of attack might a client use agianst other clients of a bulltin board web aplication that does not validate input

Cross-site Scripting attack

44
New cards

A protocol encrypted by default

SFTP (Secure Shell File Transfer Protocol)

45
New cards

Used to determine type of contents of an email message

MIME

46
New cards

Email someone a URL of a website you are using, what might you become vulnerable to?

Session hijacking

47
New cards

CPU security Vulnerability that can be a bigger problem for which type of cloud enviroment

Public

48
New cards

IoT devices that process data from their own sensors before reporting results is an example of

Edge computing

49
New cards

Popular HTTP/HTTPS method of developing a microservice API

REST

50
New cards

Most critical element in understanding current cloud security posture?

Cloud service agreement

51
New cards

One of primary resources to use at organization that many applications tie into. What cloud deployment is this

PaaS - Platform as a Service

52
New cards

What is primary downside of a private cloud model

Cost

53
New cards

A microservice API( using rest)

HTTP/HTTPS

54
New cards

Tech that allow applications and dependencies to be packaged together, version-controller, deployed, as a single unit

Containers

55
New cards

VirtualBox, application running within an OS, qualifies as what hypervisor

Type 2

56
New cards

What cloud development model has fewest security controls

public

57
New cards

Input validation important to prevent what

Buffer overflow

58
New cards

Important to define security requirements during

Requirements phase of the project

59
New cards

When is testing best accomplished

As early as possible in the process

60
New cards

Code review by second party is help to do what

Catch errors early in the programming process

61
New cards

When incorporating encryption in software, best practice is to

use well known encryption libaries

62
New cards

Preventing use of deprecated functions such as strepy() can be handled through

Code reviews

63
New cards

An attacker can hijack the session of another user of web applications using

Cross-site scripting attack

64
New cards

All exploits from software stem from

Buffer overflow

65
New cards

Prevent attacks on web applications, user inputs should be

validated on server side

66
New cards

Largest class of errors in software enginerring

Improper input validations

67
New cards

Which correctly defines annulized rate of occurance

Annualized basis, freqeuncy with which event is expected to occur

68
New cards

residual risk

Risk still remaining after an iteration of risk management

69
New cards

Which of following statements about risk if true

Actions can be taken to reduce impact of the riskW

70
New cards

What type of security controls would policy or procedure use to limit risk fall under

Operational

71
New cards

Single loss expectancy SLE equation

SLE = asset value * exposure factor

72
New cards

Type of control used after an event to minimize the damage

correctiveC

73
New cards

What category of control would an encryption algortihm fall under

Technical

74
New cards

Organization that publishes risk management framework in USA

NIST - National insitute of standards and technology

75
New cards

Holding customer PII opens up risk from

Data exfiltration

76
New cards

Important way to mitigate third party threats

Vender management

77
New cards

Purpose of establishing software change management procedures

Add structure and control to development of software s

78
New cards

Configuration auditing

Process of verifying that the configuration items are built and maintained properly

79
New cards

What backup strategy are only those portions of files and software that changed since last backup backed up

Delta

80
New cards

What is configuration control

The process of controlling changes to items that have been baselines

81
New cards

What is congfiguration identification

Process of identifying which assets need to be managed and controlled

82
New cards

Partially configured enviroment that has peripherals and software that normal processing facility contains and that can be operational within a few days

Warm site

83
New cards

Purpose of change control board (CCB)

Facilitate management oversight and better project coordination

84
New cards

Striping in RAID array is an example

Single point of failure

85
New cards

Striping in a RAID array decreases

MTTF( Mean Time Before Failure)

86
New cards

An offsite backup can help prevent data loss in case of…..

Enviormental disaster

87
New cards

Not in indicator of compromise (IOC)

Increase in traffic over port 80

88
New cards

Tool used to manage logs across multiple systems

Security information event management

89
New cards

Occurs immeditately after installation in cyber kill chain attack framework

command and control

90
New cards

Responsible for all phases of incident response process

CIRT (Computer Incident Reponse Team)

91
New cards

Which of the following should be avoided during investigation of an incident involving APT

Using corporate email system

92
New cards

Most useful tool to determine next steps when investigating a common incident

Playbook

93
New cards

Usefool tool to determine technical acpects of computer systems or network when investing a incident

Runbook

94
New cards

Determining level of risk of exposure of data look for

Time, quantity, accessed

95
New cards

Goals of an incident response process include all

protect privacy rights, minimize system disruption, confirm or dispel of an incident occurance

96
New cards

Last step of the incident response process

Lessons learned

97
New cards

During intial response to an incident, which is most impornat

accurate info

98
New cards

Chain of custody for evidence

Accounts for all persona who handled or has access to specific item of evidence

99
New cards

Which defines the exlusionary rule

Any evidence collected in violation of fourth amendment is not admissible as evidence

100
New cards

Correctly defines slack space

Unused space on disk drive when a file is smaller than allocated unit of storage