Cysa+ Full Set

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/321

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

322 Terms

1
New cards

/etc Directory

Linux Configuration

2
New cards

/Library/Preferences

Mac configuration files

3
New cards

C:\ProgramData\

Windows configuration files

4
New cards

East-West Traffic

Network traffic between systems located in the data center

5
New cards

North-South Traffic

Network traffic between systems in the data center and systems on the internet

6
New cards

Extranet

Intranet segments extended to business partners

7
New cards

Ad Hoc Network

Temporary networks that may bypass security controls

8
New cards

CASB

Enforces security policies in the cloud

9
New cards

Control Plane

Responsible for making routing and switching decisions

10
New cards

Data Plane

Responsible for carrying out the instructions of the control plane

11
New cards

SDN

Separates the control plane from the data plane— makes the network programmable

12
New cards

Password Vaulting

Stores administrative passwords

13
New cards

Monitoring

Logs administrative user activity

14
New cards

Command Proxying

Eliminates the need for direct server access

15
New cards

Credential Managment

Rotates passwords and access keys

16
New cards

On-Premises CASB

Intercepts network traffic headed to cloud services

17
New cards

Cloud-Based CASB

Uses APIs to interact with cloud services

18
New cards

CASB (Cloud Access Security Broker)

A security layer that sits between users and cloud services to monitor, control, and enforce policies on cloud usage.

19
New cards

Nmap

Free, open-source tool used to scan networks, discover devices, and find open ports and services

20
New cards

CASB benefits

Provides visibility into cloud use, offers DLP capabilities, and injects encryption into the cloud

21
New cards

Cryptography

The use of mathematical algorithms to transform information into an encrypted form that is not readable by unauthorized individuals

22
New cards

Cipher Suite

TLS depends upon pairings of encryption and hash functions known as cipher suites.

23
New cards

TLS

A cryptographic protocol that secures data as it moves between two systems over a network

24
New cards

Session Keys are known as

Ephemeral Keys

25
New cards

Pipe

Sends output to another command

26
New cards

Output redirection

Sends output to a file

27
New cards

Grep

Searched files for patterns

28
New cards

Regular expressions

Allow pattern matching

29
New cards

Window of Vulnerability

The time between the discovery of a zero-day vulnerability and the release of a security update

30
New cards

End-of-Sale

Product will no longer be offered for purchase, but the vendor will support existing customers

31
New cards

End-of-Support

The vendor will reduce or eliminate support for existing users of the product

32
New cards

End-of-Life

The vendor will no longer provide any support or updates for the product

33
New cards

CybOX - Cyber Observable eXpression

A format to describe individual events on a system (What happened)

34
New cards

STIX - Structured Threat Information eXpression

A standardized language to describe cyber threats (What the threat is)

35
New cards

TAXII - Trusted Automated eXchange of Indicator Information

A delivery system to share STIX info between tools/orgs (How it’s shared securely)

36
New cards

Data Enrichment

Automatically supplements incident data

37
New cards

Darknets

Unused but monitored IP address space

38
New cards

Webhooks

Sends signals between services

39
New cards

Network Mapping

Scans networks to search for systems that have open ports and are accepting connections from remote systems

40
New cards

Nmap - Host Discovery Flags

knowt flashcard image
41
New cards

Service Version Detection

Guesses the service versions running on an open port

42
New cards

Agent-Based Scanning

Installs software on each target device

43
New cards

Credential Scanning

Uses passwords to log into systems

44
New cards

Scan Engine Updates

Software updates to the scanner itself that fix bugs and add new features

45
New cards

Plug-In Updates

Vulnerability feed updates that provide the scanner with information about current vulnerabilities

46
New cards

General-Purpose

Nessus and OpenVAS are general-purpose vulnerability scanners.

47
New cards

Open-Source Scanners

Arachni and Nikto are open-source web application vulnerability scanners.

48
New cards

Active Scanning

Probes systems for issues

49
New cards

Active Scanning Drawbacks

Can be detected by administrators, May accidentally exploit vulnerabilities, Will miss some vulnerabilities due to firewall settings, network segmentation, and IPS deployments

50
New cards

Passive Scanning

Observes network traffic

51
New cards

SCAP Components

knowt flashcard image
52
New cards

CVSS

Scores vulnerabilities on a 10-point scale

53
New cards

Attack Vector

knowt flashcard image
54
New cards

Attack Complexity

knowt flashcard image
55
New cards

Privileges Required

knowt flashcard image
56
New cards

Stored / Persistent XSS

The attack is stored on a remote server, waiting for a victim to discover it.

57
New cards

Reflected XSS

The attack is unintentionally sent to the server by the victim and then returned in the resulting webpage.

58
New cards

Same Attack

Cross-site request forgery, CSRF, XSRF, and

"sea surf" all refer to the same attack.

59
New cards

Cross-Site Scripting (XSS)

attacks occur when an attacker embeds malicious scripts in a third-party website that are later run by innocent visitors to that site.

60
New cards

Cross-Site Request Forgery

Attacks leverage the fact that users are often logged into multiple sites at the same time and use one site to trick the browser into sending malicious requests to another site without the user's knowledge.

61
New cards

Server-Side Request Forgery (SSRF)

Request forgery attack that targets servers, rather than users, by manipulating servers into retrieving malicious data from what it believes to be a trusted source

62
New cards

Directory Traversal Attacks

When an attacker uses directory navigation references to search for unsecured files on a server

63
New cards
64
New cards
65
New cards

Confidentiality

Ensures that unauthorized individuals are not able to gain access to sensitive information

66
New cards

Integrity

Ensures that there are no unauthorized modifications to information or systems, whether intentionally or unintentionally.

67
New cards

Availability

Ensures that information and systems are ready to meet the needs of legitimate users at the time they request them

68
New cards

Privacy

focuses on the ways an organization can use and share information collected about individuals

69
New cards

Vulnerability

A weakness in a device, system, application, or process that might allow an attack to take place. Vulnerabilities are internal factors that cybersecurity professionals can control (e.g., upgrading outdated software).

70
New cards

Threat

An outside force that may exploit a vulnerability. Threats can be malicious (e.g., a hacker) or nonmalicious (e.g., an earthquake

71
New cards

Risk

The combination of a threat and a corresponding vulnerability

72
New cards

Adversarial Threat

Individuals, groups, or organizations deliberately attempting to undermine security (e.g., nation-states, trusted insiders, competitors).

73
New cards

Accidental Threat

Individuals mistakenly performing an action that undermines security during routine work (e.g., a system administrator accidentally deleting a critical disk volume).

74
New cards

Structural Threat

Equipment, software, or environmental controls failing due to resource exhaustion, exceeding operational capability (extreme heat), or age.

75
New cards

Environmental Threat

Natural or human-made disasters outside organizational control (e.g., fires, severe storms, power failures).

76
New cards

Technical controls

Systems, devices, software, and settings that enforce CIA requirements (e.g., secure network building, endpoint security).

77
New cards

Operational controls

Practices and procedures that bolster cybersecurity (e.g., conducting penetration testing, using reverse engineering).

78
New cards

Network Access Control (NAC)

Limiting network access to authorized individuals & Ensuring that systems accessing the network meet basic security requirements.

79
New cards

Triple-homed Firewalls

connect to three different networks: the Internet, the internal network, and a special network known as the demilitarized zone (DMZ) or screened subnet

80
New cards

DMZ

A network zone designed to house systems that receive outside connections (e.g., web and email servers). Placing these systems here isolates them, so if they are compromised, they pose little threat to the internal network.

81
New cards

Rule Base/ACL

Firewalls evaluate connection requests against a rule base, which is an access control list (ACL).

82
New cards

Default Deny Principle

If there is no rule explicitly allowing a connection, the firewall will deny that connection

83
New cards

Port 20,21

FTP

84
New cards

Port 22

SSH

85
New cards

Port 23

Telnet

86
New cards

Port 25

SMTP

87
New cards

Port 53

DNS

88
New cards

Port 80

HTTP

89
New cards

Port 443

HTTPS

90
New cards

Packet filtering firewalls

checking only packet characteristics against rules; often found in routers.

91
New cards

Stateful inspection firewalls

Maintain information about the state of each connection; the most basic standalone firewall products

92
New cards

Next-generation firewalls (NGFWs)

Incorporate contextual information about users, applications, and business processes; current state-of-the-art.

93
New cards

Web application firewalls (WAFs)

Specialized firewalls designed to protect against web application attacks (e.g., SQL injection, cross-site scripting).

94
New cards

Jump Box

A server placed in a screened subnet to act as a secure transition point between networks, providing a trusted path.

95
New cards

Honeypots

Systems designed by experts to falsely appear vulnerable and lucrative to attackers. They simulate a successful attack and monitor activity to learn attacker intentions

96
New cards

DNS Sinkholes

Feed false information to malicious software.

97
New cards

Hardening

involves making configurations as attack-resistant as possible.

98
New cards

Compensating Controls

Alternate means

99
New cards

Mandatory Access Control (MAC)

administrators set all security permissions, and end users cannot modify them

100
New cards

Discretionary Access Control (DAC)

the file owner controls the permissions

Explore top flashcards