study cyber

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Each service defined by TAXII is required to be implemented

False

FS-ISAC stands for?

Financial Services Information Sharing and Analysis Center

Which is not a valid SQL injection logical expression commonly used by an adversary

'AND '1' = '1

What XML language best describes a measurable event or stateful property in the cyber domain, such as registry key creation, file deletion or HTTP GET operation received?

CybOX

What is the Wireshark Analyze feature that allows content to be decoded using a specific protocol, event if that protocol is not directly map to the specific port reserved for it use?

Decode As

which are the two problems with log files and determining temporal order?

Different system clocks Resolution too course

A DMZ is generally used for which services

Email Server Web Server

A honeypot has valuable production value

False

What are the two types of Intrusion Detection Systems that are used to protect data-at-rest and data-in-motion?

Host, Network

Which is not a module used in Volatility, the

Idrhooks

The name of the TAXII library used to support TAXII client development is?

Libaxii

The Kippo SSH honeypot performs what level of interaction?

Medium interaction

The name of the python tool (source module) used to convert OpenIOC formatted reports to STIX is what?

OpenIOC-to-STIX

Which is not a semi-legitimate tool for remote access

PC Anywhere

we can split the kill chain up into two different types of actions, what are they?

Proactive, Reactive actions

A computer infected with the Zeus virus using a specific IP address for C2 can be represented as what type of STIX object?

TTP

Assertions of an identity as Unit 61398 within the Chinese PLA could be used to represented what type of STIX object

Threat Actor

Computer forensics corresponds to which of the following?

all of the above

What type of data enrichment can be done on information collected from a honeypot?

all of the above

which are services defined by TAXII?

all of the above Discovery Collection Management Inbox Poll

A documented vulnerability such as CVE-201400160 could be represented as what type of STIX object

exploit target

The program Trudy used to hide her malicious software attack was named?

hfnetchk

What security devices is the following used to cirumvent? %00 Union Select password FROM tblUsers WHERE username='admin'--

intrusion detection and WA firewalls

what is the ncat command on Windows to allow a system at 192.168.70.1 connect to a server at 192.168.70.32 using port 6666 use only a single space between parameters

ncat 192.168.70.32 6666

when a security scanning device fails to detect malicious activity, this is known as a false

negative

Which is the first action taken to preserve the media integrity from data corruption during computer frensics?

use a write blocker


Ensembles d'études connexes

CH. 16 Health insurance policy provisions

View Set

10. Neural Networks / Deep Learning

View Set

Modern Database Management - Chapter 4

View Set

Marketing 350 Chapter 3 Questions from Cengage

View Set

C++ Chapter 1 Introduction to Computers & Programming

View Set

Final Exam Review Operating System Security

View Set

NCLEX Prep Content Mastery Final Exam

View Set