Security+ 501

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What character is essential in input for a SQL injection attack

'

10000000

128

11000000

192

11100000

224

11110000

240

11111000

248

11111100

252

11111110

254

11111111

255

/16

255.255.0.0

/24

255.255.255.0

IPv4 allows for how many possible IP address?

4.3 Billion

What network port is used for SSL/TLS VPN connections?

443

What is the minimum suggested length for a strong password?

8 Characters

Creates a formal record of a DR or BC event

AAR

Allows administrators to make access control decisions based upon characteristics of the user, object, and environment.

ABAC

Acknowledges a SYN or FIN

ACK

Advanced Encryption Standard

AES

A set of subroutine definitions, protocols, and tools for building application software

API

Application Programming Interface

API

Advanced Persistent Threat

APT

Agents who are well funded, highly skilled, typically government sponsored, and have access to Zero Day Vulnerabilities

APTs

American Registry for Internet Numbers

ARIN

Address Resolution Protocol

ARP

Protocol that translates IP addresses into the hardware MAC addresses on local area networks

ARP

A type of attack in which a malicious actor sends falsified ARP messages over a local area network

ARP Poisoning

In the Kerberos protocol, what system performs authentication of the end user?

AS

What router technology can be used to perform basic firewall functionality?

Access Control List

Multi-factor authentication is used to prevent

Account Hijacking

Root kits, Polymorphism, and Armored Viruses are all types of

Advanced Malware

Any security event with negative consequences

Adverse Security Event

Malware that has the specific purpose of displaying advertisements

Adware

Changing the default search engine, displaying pop p advertisements, and replacing legitimate ads with other ads are all

Adware mechanisms

Three different types of Malware payloads

Adware, Spyware, and Ransomware

AAR

After Action Report

What is the name of the application control technology built-in to Microsoft Windows?

AppLocker

Layer that determines how users interact with the data using web clients and applications

Application

Prohibits the installation of specified applications on mobile devices

Application Blacklisting

Only allows the installation of approved applications on mobile devices

Application Whitelisting

Best defense against Trojans

Application control

Code execution where the attacker runs commands of his or her choice

Arbitrary Code Execution

System Sprawl is considered a/an

Architectural Vulnerability

Dissects how everything fits together, Analyzes the interaction of various systems

Architecture Review

Malware that prevents reverse engineering techniques to hide themselves

Armored Virus

The sum of the different points where an unauthorized user can try to enter data to or extract data from an environment

Attack Surface

Enumerates the attack surface, looking for all possible paths of attack

Attack Surface Review

External media, attrition, web, email, and improper usage are all considered

Attack Vectors

ABAC

Attribute Based Access Control

Unpredictable and uncontrollable, but normal, reduction of work force due to resignations, retirement, sickness, or death

Attrition

During what phase of the access control process does a user prove his or her identity?

Authentication

Install without the user's knowledge or intervention when published by the device manufacturer

Automatic Updates

DoS atacks affects which part of the CIA Triad?

Availability

Business Continuity Planning

BCP

Lightweight operating system stored in firmware that provides the basic functionality necessary to load the full operating system from the disk

BIOS

Allows employees to choose any device they want and use it in the corporate network

BYOD

Bring Your Own Device

BYOD

Remove all corporate information from the personally owned device

BYOD Offboarding

Ensure the device meets security requirements and is safely configured

BYOD Onboarding

Malware that provides workaround access to a system

Backdoor

Hardcoded accounts, default passwords, and unknown access channels are all

Backdoor mechanisms

Configurable text-based welcome screens from network hosts that generally display system information

Banner

Retrieves information over a network connection that explicitly identifies the operating system and version

Banner Grabbing

Provides an initial review of a systems security status, Compares the current configuration to the expected configuration

Baseline Reporting

BIOS

Basic Input/Output System

Proxy servers, content filters, SSL Accelerators, and load balancers will typically

Belong in the DMZ

Flexibility, scalability, agility, and cost effectiveness are all

Benefits of Cloud Computing

Type of Penetration Test Attackers have no knowledge of the network environment

Black Box

An attack where an attacker sends Bluetooth spam to a user's device

Bluejacking

An attack where an attacker exploits firmware flaw in order Bluetooth devices. Forces a pairing between devices which grants access to the device.

Bluesnarfing

A network of infected computers used for malicious intent

Botnet

Delivering spam, engaging in DDoS attacks, mining bitcoin, and bruteforce attacks

Botnet techniques

Layer 2 Device. Connect two networks together using MAC addresses

Bridge

BYOD

Bring Your Own Device

Occurs when a network system is overwhelmed by continuous multicast or broadcast traffic

Broadcast Storm

Attack where all password combinations are tried. Also called Known Ciphertext Attacks.

Brute Force

An exploit that takes advantage of a program that is waiting on a user's input

Buffer Flow

What type of attack seeks to write data to areas of memory reserved for other purposes

Buffer Overflow

Highly Sensitive, Sensitive, Internal, Public

Business Classifications

A set of controls designed to keep a business running in the face of adversity, whether natural or man-made

Business Continuity Planning

An enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (CCM) of the AES standard

CCMP

Counter Mode Cipher Block Chaining Message Authentication Code Protocol

CCMP

Confidentiality, Integrity, and Availability

CIA Triad

A strategy in which a mobile device is chosen by a company, but it can be used for personal activites as well

COPE

An attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated

CSRF

Offers employees a list of approved devices that can also be used for private purposes

CYOD

Which one of the following security mechanisms prevents laptops from theft while they are in use?

Cable Lock

CHAP

Challenge Handshake Authentication Protocol

Ensures that an organization follows a standard process for requesting, reviewing, approving, and implementing changes to information systems

Change Management

CYOD

Choose Your Own Device

Attack where attacker can create an encrypted message of his or her choice

Chose-Plaintext Attack

A packet with every single option set for whatever protocol is in use. Used in DDoS attacks.

Christmas Tree Packet

What type of lock always requires entering a code to enter the facility?

Cipher Lock

10.0.0.1 - 10.255.255.255

Class A Private IP Address Range

172.16.0.1 - 172.31.255.255

Class B Private IP Address Range

What class of fire extinguisher is designed to work on electrical fires?

Class C

192.168.0.1-192.168.255.255

Class C Private IP Address Range

An attack where the attacker hides elements of a web page behind other elements so that a user cannot see what he or she is actually clicking

Clickjacking

The delivery of computing resources as a service over a network

Cloud Computing

Occur when an attacker exploits a vulnerability in a system that allows the attacker to run commands on that system

Code Extension Attack

Performs assessment of software security

Code Review

Protects against malicious drivers

Code Signing

Empty data center, stocked with core equipment, inexpensive, No servers or data

Cold Site

The developer runs a compiler to convert source code in an executable file written in machine language. C, C++, and Java are examples of this

Compiled Code

Ensure that an organization's information security controls are consistent with the laws, regulations, and standards that govern the organization's activities

Compliance Programs

Ensure that an organizations information security controls are consistent with the laws, regulations, and standards that govern the organizations activities

Compliance Programs

Laws, regulations, and standards are all

Compliance obligations

Data theft affects which part of the CIA Triad?

Confidentiality

Allow quick identification and remediation of security gaps

Configuration Baselines

VLAN Trunking must be enabled as well as switch ports must be assigned to VLANs in order to

Configure VLANs

The highest priority of a first responder must be

Containing the damage through isolation

A type of exploit used by a malicious hackers to present a faked or modified Web site to the user as if it were legitimate

Content Spoofing

Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions

Continuous Security Monitoring

What type of object must a hacker typically access in order to engage in a session hijacking attack

Cookie

Data stored by websites in user browsers. Useful to recognize users and to remember information

Cookies

Competitors that use hacking tools and techniques for corporate espionage purposes

Corporate Espionage

COPE

Corporate Owned, Personally Enabled

CSRF, XSRF, and Sea Surf all refer to

Cross-Site Request Forgery

Weak Cipher Suites, Poor Key Management, and Poor Certificate Management are all

Cryptographic Vulnerabilities

Access control method in which users control access to resources they own

DAC

Discretionary Access Control

DAC

A denial of service that leverages a botnet to overwhelm a target

DDoS attack

Microsoft Technology that enforces specific restrictions on the acceptable locations for executable code. Prevents attacks that attempt to execute code from space assigned to a process

DEP

Examples of weak algorithms

DES, RC4

Dynamic Link Library

DLL

A technique used for running code within the address space of another process by forcing it to load a dynamic-link library(Tricks an application into loading malicious code)

DLL Injection

Data Loss Prevention

DLP

Contains systems that must accept direct external connections, isolates those systems due to risk of compromise

DMZ

Demilitarized Zone

DMZ

Domain Naming Service

DNS

Port 53

DNS

Service that translates common domain names into IP addresses for the purpose of network routing

DNS

A type of attack that exploits vulnerabilities in the domain name system to divert Internet traffic away from legitimate servers and towards fake ones

DNS Poisoning

Translates domain names into IP addresses (UDP Port 53)

DNS Servers

Adds signatures to DNS

DNSSEC

Assign information into categories, known as classifications, that determine storage, handling and access requirements

Data Classification Policies

DEP

Data Execution Prevention

Layer that transfers data between two nodes connected on a network

Data Link

Technology solutions that search systems and monitor networks for sensitive information that is unsecured and provide the ability to remove the information, block the transmission, or encrypt the stored data.

Data Loss Prevention

Concept that data is subject to the law of the jurisdiction where it is stored

Data Sovereignty

Organizations should use multiple, overlapping security controls to achieve each of their security objectives

Defense in Depth principle

During the offboarding process administrators disable accounts and revoke authorizations at the appropriate time

Deprovisioning

What type of security control is designed to scare a potential intruder into not attempting a break-in in the first place?

Deterrent Control

Serves as the software interfaces between hardware devices and the operating system

Device Driver

Attack where all words in the English language are used to guess a password combination

Dictionary Attack

Backup that includes all data modified since the last full backup

Differential

Designed to restore a business to normal operations as quickly as possible. A subset of business continuity

Disaster recovery

A type of access control system where permissions may be set by the owners of files, computers, and other resources

Discretionary Access Control

DAC

Discretionary Access Control

DCS

Distributed Control System

DDoS

Distributed Denial of Service

Denial of Service

DoS

Attack that makes a resource unavailable for legitimate use, sends a large number of requests to a server, difficult to distinguish from legitimate responses

DoS attack

Attacks steal a domain registration or alter DNS records

Domain Hijacking

Attack where attacker uses a Man in the Middle exploit. Two systems are forced to use weak cryptographic implementations

Downgrade Attack

Refactoring and Shimming are forms of

Driver Manipulation

Involves searching through trash or garbage looking for something useful. This is often done to uncover useful information that may help an individual get access to a particular network

Dumpster Diving

Appear to function normally but trigger an emergency security response

Duress Code

Execute code to verify that it is functioning correctly and does not have security flaws

Dynamic Code Testing

Port Security mode. Switches memorize the first MAC address they see on each port and limit access to that address

Dynamic Port Security

49152-65535

Dynamic Ports

End of Life

EOL

The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source

Email Spoofing

What term does the Security+ exam use for smart devices?

Embedded Devices

When developing a disaster plan what should be the number one priority

Employee Safety

Uses cryptography to render information unreadable without the necessary decryption key

Encryption

What are the two key issues for cloud data security?

Encryption and Access Control

Product will no longer be offered for purchase, but the vendor will support existing customers

End of Sale

Vendor will reduce or eliminate support for existing users of the product

End of Support

During what phase of continuous security monitoring does the organization define metrics

Establish

During what phase of continuous security monitoring does the organization define metrics?

Establish

Notifying a vendor of vulnerability, providing the vendor a reasonable amount to create a patch, and disclosing the vulnerability is

Ethical Disclosure

Record of a computer's alerts and notifications

Event Log

A fraudulent Wi-Fi access point that appears to be legitimate, set up to eavesdrop on wireless communications. The wireless LAN equivalent of the phishing scam.

Evil Twin

Provides a chance to debrief departing employees and remind them of their NDAs

Exit Interview

Block traffic based upon more advanced criteria, such as source and destination IP addresses/ports, and the protocols used for communication

Extended ACL

Closes a connection

FIN

What characteristic of biometrics measures the frequency at which legitimate users are denied access to a system or facility?

FRR

Fault Tolerance

FT

Ports 20 and 21, Data transfer and control

FTP

System misidentifies an individual as an authorized user

False Acceptance

FAR

False Acceptance Rate

When a scanner fails to report a vulnerability that does exist, making it much more dangerous

False Negative

Occurs when a control fails to trigger in a situation where it should

False Negative Error

When a scanner reports a vulnerability that does not exist, requiring verification by security administrators

False Positive

Occurs when a control inadvertently triggers when it should not

False Positive Erros

System fails to recognize an authorized user

False Rejection

FRR

False Rejection Rate

Makes a single system resilient against technical failures

Fault Tolerance

RAID is not a backup strategy but is instead considered a

Fault tolerance technique

What type of storage network requires the use of dedicated connections?

Fibre Channel

Network device that filters and blocks unwanted network traffic

Firewall

Source addresses, destination addresses, destination port/protocol, and action (allow or deny) are all

Firewall Rule Contents

Defines how the firewall should act when it sees a new connection request

Firewall Rules

What technology can help prevent denial of service attacks on a network?

Flood Guard

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Fourth Amendment

Detects patterns in ciphertext

Frequency Analysis

Backup that includes a complete copy of all data

Full

Grants complete authority over a resource

Full Control

Switches primary operations to the alternate facility and can be very disruptive to business

Full Interruption Test

The three types of data backups

Full, Differential, and Incremental

A software testing technique that feeds software many different input values in an attempt to cause an unpredictable state or unauthorized access

Fuzzing

What Windows mechanism allows the easy application of security settings to groups of users?

GPOs

What technology allows administrators to pinpoint the location of a mobile device?

GPS

What is the most appropriate type of fire suppression system to install in a data center computer room?

Gaseous Fire Suppression

Alerts when a device leaves a defined area

Geofencing

Allows the real time and historical location of GPS enabled devices

Geolocation

Process of adding geographical identification metadata to various media such as a photograph or video, websites, SMS messages

Geotagging

Type of Penetration Test. Attackers have some knowledge of the network environment

Gray Box

High Availability

HA

Which regulatory scheme applies to healthcare providers in the United States?

HIPAA

A physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. Expensive.

HSM

Hyper Text Makeup Language

HTML

Used to create electronic documents (called pages) that are displayed on the World Wide Web

HTML

Port 80, Unencrypted Communications

HTTP

Port 443, Encrypted Communications

HTTPS

Hackers who seek to use hacking tools to advance political and social agendas

Hacktivist

HSM

Hardware Security Module

One way functions that transform a variable length input into a fixed length output

Hash function

Uses multiple systems to protect against service failure

High Availability

Employers should always make personnel security the

Highest Priority

Network that is set up to act as a decoy to lure cyberattacks and to detect, deflect, or study attempts to gain unauthorized access to information systems

Honeynet

A computer system that is set up to act as a decoy to lure cyberattacks and to detect, deflect, or study attempts to gain unauthorized access to information systems

Honeypot

DLP that uses software agents installed on a single system

Host Based DLP

Which one of the following security controls is built in to Microsoft Windows?

Host Firewall

Software components of an operating system that limit connections to a server

Host Firewalls

Fully operational data center, stocked with equipment and data, available at moments notice, Expensive

Hot Site

Three different sites of disaster recovery facilities

Hot Site, Cold Site, and Warm Site

HMI

Human Machine Interface

Attack where different variations of passwords are used

Hybrid Attack

Cloud utilized by organizations that use both public and private clouds

Hybrid Cloud

Internet Corporation for Assigned Names and Numbers

ICANN

What type of packet do participating systems send during a Smurf attack

ICMP echo request

Industrial Control System

ICS

Intrusion Detection System

IDS

Port 143, Management of electronic mail messages on a server

IMAP4

Port 993

IMAP4 (Encrypted)

Network layer protocol routes information across networks, provides an addressing scheme, delivers packets from source to destination

IP

Numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication

IP Address

A hijacking technique in which a cracker masquerades as a trusted host to conceal his identity, spoof a Web site, hijack browsers, or gain access to a network

IP Spoofing

A hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network

IP Spoofing

Intrusion Prevention System

IPS

Network protocol suite that authenticates and encrypts the packets of data sent over a network

IPsec

Processes and practices used to design systems

IT Architecture

Infrastructure as a Service

IaaS

In SAML, what organization performs authentication of the end user?

Identity Provider

Security stance that treats everything not given specific and selective permission as suspicious

Implicit Deny

What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action for that communication?

Implicit Deny

Any action which is not explicitly allowed muse be denied

Implicit Deny principle

Notification, Escalation, Reporting, System Isolation, Forensic Analysis, and Evidence Handling are all

Incident Response Procedures

Backup that includes all data modified since the last full of incremental backup

Incremental

What type of backup includes only those files that have changed since the most recent full or incremental backup?

Incremental

SCADA, DCS, and PLC are all types of

Industrial Control Systems

Common policies every organization should implement include the

Information Security Policy, Privacy Policy, and Acceptable Use Policy

IR

Infrared

What is the most effective defense against cross-site scripting attacks?

Input validation

A malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates

Insider Threat

Background investigations, monitoring, training, and DLP are ways to defend against

Insider Threats

Website Defacement affects which part of the CIA Triad?

Integrity

IP

Internet Protocol

IoT

Internet of Things

Computer executes the source code instructions as written by the developer. R, Perl, and PHP are examples of this

Interpreted Code

A social engineer calls an administrative assistant in your organization and obtains her password by threatening her that her boss' account will be deleted if she does not provide the password to assist with troubleshooting. What type of attack is this/

Intimidation

A device or software application that monitors a network or systems for malicious activity or policy violations

Intrusion Detection System

A preemptive approach to network security used to identify potential threats and respond to them swiftly

Intrusion Prevention System

Vulnerability Scan. A dangerous mode that might disrupt system operation

Intrusive Scanning

Regularly moving people between jobs to prevent fraud

Job Rotation

What toolkit enables attackers to easily automate evil twin attacks

KARMA

Rootkit that can run with system privileges

Kernel Mode Rootkits

Set of all possible encryption keys usable with an algorithm

Keyspace

Attack where attacker has access to an unencrypted message

Known-Plaintext Attack

Provides the means to query a centralized directory service, such as Microsoft Active Directory

LDAP

An individual should only have the minimum set of privileges necessary to carry out his or her job functions

Least Privelege

Allowing the user to have minimum permissions necessary

Least Privilege

Consist of shared code objects that perform related functions.

Libraries

LDAP

Lightweight Directory Access Protocol

What two factors are used to evaluate a risk?

Likelihood and impact

Which device helps networked services scale with increasing demand?

Load Balancer

System that spreads demand across systems

Load Balancing

The process of distributing data across disparate services to provide redundancy, reliability, and improve performance

Load Balancing

Malware that is set to issue a payload when certain criteria is met

Logic Bomb

Date/Time reached, file contents, and API call results are all

Logic Bomb conditions

Mandatory Access Control

MAC

Fill switch's MAC address table with many entries, causing it to flood traffic on all ports

MAC Floods

Attack that alters a systems hardware address

MAC Spoofing

Examples of weak hash functions

MD4, MD5, SHA-1

A cryptographic algorithm that takes an input of arbitrary length and produces a message digest that is 128 bits long

MD5 Hash

Perform mobile device configuration management, prevents users from modifying security settings, control data stored on devices and, Manage applications on devices

MDM

Man In The Browser

MITB

Man In The Middle

MITM

Provide security services for other organizati0ons as a managed service

MSSPs

Which access control card is the easiest to duplicate without permission?

Magnetic Stripe card

Malicious Software

Malware

Attack exploits flaws in browsers and browser plugins

Man In The Browser

An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other

Man in the Middle

Implementing least privilege, implementing separation of duties, implementing job rotation, and managing the account life cycle are all tasks needed to

Manage accounts

MSSPs

Managed Security Service Providers

Compliance with policies and standards are always

Mandatory

An access control system where the operating system enforces security policies that users may not modify

Mandatory Access Control

Enforcing periods of time when employees have no access to systems

Mandatory Vacations

Require that the user check for updates and manually download and install them when available

Manual Updates

Removes portions of sensitive information to reduce its sensitivity

Masking

Connect different telecommunication networks together

Media Gateways

Memory Leaks, DLL Injection and Null Pointers are all

Memory Vulnerabilities

Occurs when a computer program incorrectly manages memory allocations in such a way that memory which is no longer needed is not released

Memory leak

Top Secret, Secret, Confidential, Unclassified

Military Classifications

Collecting minimal information and storing it only as long as needed

Minimization

MDM

Mobile Device Management

Adds the ability to delete files and also includes Read & Execute permissions

Modify

Combines authentication techniques from two or more of the authentication categories: something you know, something you have, something you are, somewhere you are, and something you do.

Multifactor Authentication

What type of fuzz testing captures real software input and modifies it?

Mutation Fuzzing

Network Access Control

NAC

Method of remapping one IP address space into another by modifying network address information in IP header of packets while they are in transit across a traffic routing device. (Translates Private IP addresses at the border of a network.)

NAT

What technology provides the translation that assigns public IP addresses to privately addressed systems that wish to communicate on the Internet?

NAT

Which agreement is most directly designed to protect confidential information after an employee has left the organization?

NDA

A set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication in short range

NFC

Covers distances measured in centimeters using electromagnetic induction Usually used for payment methods (Apple Pay, Android Pay)

NFC

Near Field Communications

NFC

What U.S. federal government agency publishes security standards that are widely used throughout the government and private industry?

NIST

NTLM

NT LAN Manager

Port 123, Protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks

NTP

NFC

Near Field Communication

Ports 137, 138, and 139. Used for network communications

NetBIOS

Layer that expands networks to many different nodes (IP)

Network

Intercepts network traffic coming from unknown devices and verifies that the system and user are authorized before allowing further communication. Uses 802.1x

Network Access Control

NAT

Network Address Translation

Wireshark is an example of a

Network Analyzer

DLP that scans network transmissions for sensitive information

Network Based DLP

Analyzes details of network communications to find oddities particular to a specific operating system and version

Network Fingerprinting

Hardware devices that regulate connections between two networks. Placed on the border of networks

Network Firewalls

software construct serving as a communication endpoint, which is used by the Transport Layer protocols of Internet Protocol suite, such as User Diagram Protocol and Transmission Control Protocol

Network Ports

What is the most important control to apply to smart devices?

Network Segmentation

NTP

Network Time Protocol

Ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated

Non Repudiation

Digital Signatures provide

Non Repudiation

Vulnerability scan. A safe mode that wont disrupt system operation

Non-Intrusive Scanning

A value reserved for indicating that the pointer does not refer to a valid object

Null Pointer

Authorization protocol designed to work across a variety of web services

OAuth

Open Systems Interconnection

OSI

Backups should be stored at an

Offsite location

Allows computing clients to verify the identity of an end-user based on the authentication performed by an authorization server, as well as to obtain basic profile information about the end-user in an interoperable and REST-like manner

OpenID Connect

Identification and authentication protocol designed to work with OAuth

OpenID Connect

Disaster recovery efforts end only when the business is

Operating under normal conditions

Adversaries that seek to use hacking tools, such as ransomware, for financial gain

Organized Crime

What type of firewall rule error occurs when a service is decommissioned but the related firewall rules are not removed?

Orphaned Rule

Firewall configuration error that allows access to decommissioned systems and services

Orphaned Rules

The core issues around BYOD relate to

Ownership

Which authentication protocol requires the use of external encryption to protect passwords?

PAP

Each computer on LAN is translated to the same IP address, but with a different port number assignment.

PAT

Padding Oracle On Downgraded Legacy Encryption

POODLE

An exploit that takes advantage of the way some browsers deal with encryption. Can be used to target browser-based communication that relies on SSL 3.0 protocol for encryption and authentication

POODLE attack

Port 110, Used by local e-mail clients to retrieve e-mail from a remote server

POP3

Port 995

POP3 (Encrypted)

Platform as a Service

PaaS

Basic unit of network communications, contain a data payload to be sent, contains a header with additional information

Packet

What information is not found in network flow data?

Packet Content

Silently alert security personnel to a dangerous situation when pressed

Panic Button

Activates the disaster facility but do not switch operations there

Parallel Test

Allows the use of credentials from one system to gain access to another system

Pass the hash attack

PAP

Password Authentication Protocol

Recognizing known patterns of sensitive information such as SSNs

Pattern Matching

The malicious action that the malware performs.

Payload

Goal is to test security controls. Testers attack systems and networks. Verify if threats exist and exploit known vulnerabilities

Penetration Testing

After exploiting a vulnerability in a system, attackers install tools on that system to allow future access- even if the initial vulnerability is corrected

Persistence

PII

Personal Identifiable Information

Most valuable asset on any computer

Personal data (Data)

A scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent

Pharming

Attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication

Phishing

Layer that sends bits over the network

Physical

Tailgating, Shoulder Surfing, and Dumpster diving are all forms of

Physical Social Engineering

After exploiting a vulnerability in a system, attackers use that system as a base from which to target other systems on the same LAN

Pivot

A programming language object, whose value refers to another value stored elsewhere in the computer memory using its memory address.

Pointer

Malware that changes code to avoid detection, uses encryption with a different key on infected systems

Polymorphic Virus

What technique does some malware use to modify itself each time it infects a new system to avoid signature detection systems?

Polymorphism

Ports used by LDAP

Port 389(unencrypted) Port 636 (encrypted)

Port used by Kerberos

Port 88

PAT

Port Address Translation

Restricts traffic from a source port to a single destination port

Port Isolation

Application designed to probe a server or host for open ports

Port Scanner

Limits the devices that may connect to a network switch port by MAC address

Port Security

POP3

Post Office Protocolv3

Common points of failure in sysetms will usually be

Power supply and storage media

Criminal record checks, sex offender registry, reference checks, education and employment verification, and credit checks are all apart of

Pre-employment Screening

Layer that translates data so it can be transmitted on a network. Also performs encryption and decryption

Presentation

Limiting Administrative access and patching systems/applications are ways to

Prevent Code Execution Attacks

Anti-malware software, security patches, and user education are all ways to

Prevent Malware

POLP

Principle of Least Privilege

Cloud used by organizations as a dedicated cloud infrastructure

Private Cloud

Available for anyone's use but not routable over the internet

Private IP address

The Payment Card Industry Data Security Standard (PCI DSS) is an example of what type of regulation?

Private regulation

A situation that occurs when a user accumulates excess permissions after shifting job responsibilities one or more times

Privilege Creep

Term used to indicate that the product is in the end of its useful life and a vendor stops marketing, selling, or rework sustaining it

Product End of Life

PLC

Programmable Logic Controller

Firewall configuration error that allows more access than necessary

Promiscuous Rules

The way that a malware object spreads.

Propagation Mechanism

Tool (hardware or software) used to capture and analyze signals and data traffic over a network(Also known as packet analyzers or network analyzers)

Protocol Analyzer

After onboarding, administrators create authentication credentials and grant appropriate authorization.

Provisioning

A server that acts as an intermediary for requests from clients seeking resources from other servers

Proxy Server

Anonymity, Performance Boosting and Content Filtering are all

Proxy Server Benefits

Cloud used by organizations as a share tenancy infrastructure

Public Cloud

SaaS, PaaS, and IaaS are all

Public Cloud Tiers

Assigned by a central authority and are routable over the internet. Managed by ICANN

Public IP addresses

Disk mirroring, stores the same data on two different disks

RAID 1

Disk striping with parity, uses three of more disks to store data and parity information

RAID 5

Malware that provides backdoors to hacked systems

RAT

Remote Access Trojan

RAT

Port 3389, Provides a user with a graphical interface to connect to another computer over a network connection

RDP

Provides a description of the change, expected impact, risk assessments, rollback plan, who is involved, schedule and the affected items

RFC

Radio Frequency Identification

RFID

Uses electromagnetic fields to automatically identify and track tags attached to objects

RFID

Maximum time period from which data may be lost in the wake of a disaster

RPO

Maximum amount of time that it should take to recover a service after a disaster

RTO

Power the IoT by providing reliable and secure computing for IoT devices

RTOS

Occurs when the proper functioning of a security control depends upon the timing of actions performed by the user or computer

Race Condition

Attack where precomputed hashes are used to crack a password

Rainbow Table Attack

Cryptolocker is an example of what type of malicious software

Ransomware

Malware that blocks access to a system

Ransomware

Arrives via email attachment, encrypts local files, demands ransom on short notice are all

Ransomware techniques

Allows the user to read the file

Read

Allows the user to read the file and execute an application

Read & Execute

Asks each team member to review their role in the disaster recovery process and provide feedback

Read-throughs

RTOS

Real Time Operating System

RPO

Recovery Point Objective

RTO

Recovery Time Objective

RAID

Redundant Array of Inexpensive Disks

Modifying a driver to carry out malicious activities. Requires access to driver source code

Refactoring

A description of the specific controls that would achieve an organizations security objectives

Reference Architectures

1024-49151

Registered Ports

What component of a change management program includes final testing that the software functions properly?

Release Management

Code execution attack that takes place over a network connection

Remote Code Execution

RDP

Remote Desktop Protocol

What phase of the capability maturity model introduces the reuse of code across projects?

Repeatable

RFC

Request For Change

Proxy server that retrieves resources on behalf of a client from one or more servers

Reverse Proxy

Process of systematically analyzing potential responses to each risk and implementing strategies to control those risks appropriately

Risk Management

Risk avoidance, risk transference, risk mitigation, risk acceptance, risk deterrence are all

Risk Management Strategies

Any Wi-Fi access point that is installed on a network but is not authorized for operation on that network, and is not under the management of the network administrator

Rogue Access Point

A special superuser account that provides unrestricted access to system resources

Root Account

Malware that can escalate user privileges. Can run in user mode or kernel mode

Rootkit

Backdoors, Botnet Agents, and Adware/Spyware are all

Rootkit Payloads

Layer 3 device. Used to connect networks. Use ACL's to perform stateless inspections

Router

What network device can connect together multiple networks?

Router

Perform basic filtering and can reduce the load placed on firewalls

Routers

A serious network problem which happens when a data packet is continually routed through the same routers over and over

Routing Loop

A technology that allows you to encrypt your emails. Based on asymmetric cryptography to protect your emails from unwanted access. It also allows you to digitally sign your emails

S/MIME

Allows SSO within a web browser across a variety of systems

SAML

A network which provides access to consolidated, block level data storage

SAN

Storage Area Network

SAN

What type of system is used to gather information from remote sensors via telemetry?

SCADA

Provides secure command line transfer over SSH

SCP

Provide real-time analysis of security alerts generated by applications and network hardware

SIEM

Security solution that collects information from diverse sources, analyzes it for signs of security incidents, and retains it for later use.

SIEM

Port 25, Used for email routing between mail servers

SMTP

Port 465

SMTP (Encrypted)

Attack consists of insertion of a SQL query via the input data from the client to the application. The most common application layer attack.

SQL Injection

Port 22, Secure logins, file transfers (scp, sftp) and port forwarding

SSH

Service Set Identifier

SSID

Handle the difficult cryptographic work of setting up TLS connections

SSL Accelerator

Provide dedicated hardware for SSL/TLS handshakes

SSL/TLS Accelerators

Builds a loop-free logical topology for Ethernet networks. Prevents broadcast storms

STP

Opens a connection

SYN

What TCP flag indicates that a packet is requesting a new connection?

SYN

Fill connection state tables on firewalls with half open connection entries

SYN Floods

Software as a Service

SaaS

Development and testing environments where programmers can work with code to modify and test it without having access to any production resources.

Sandboxes

Unskilled attackers who simply reuse hacking tools developed by others

Script Kiddie

Technology where the system firmware checks that the system boot loader is signed with a cryptographic key authorized by a database contained in the firmware

Secure Boot

SCP

Secure Copy

S/MIME

Secure/Multipurpose Internet Mail Extensions

SAML

Security Assertion Markup Language

Keeps the lessons learned during security training

Security Awareness

Procedures and mechanisms that an organization puts in a place to manage security risks

Security Controls

Any observable action on a computer system that impacts security

Security Event

A collection of standards and practices designed to form a solid approach to information security

Security Frameworks

Any adverse event that violates security policies

Security Incident

SIEM

Security Information and Event Mnagement

Procedures, policies, guidelines, and standards all for the

Security Policy Framework

Provides users with the knowledge they need to protect the organizations security

Security Training

Performing any critical business function should require the involvement of two or more individuals

Separation of Duties

Layer that manages the exchange of communications between systems

Session

An additional copy of the primary database file

Shadow File

Wraps a legitimate driver with a malicious shim. Does not require access to the legitimates driver's source code

Shimming

Attack where the attacker uses observation techniques, such as looking over someone's shoulder, to get information

Shoulder Surfing

What is the most effective tool to use against dumpster diving attacks

Shredder

Identifying viruses by detecting known code patterns from a database

Signature Detection

What type of malware prevention is most effective against known viruses?

Signature Detection

Uses a practice scenario to test the disaster recovery plan

Simulation

What type of website does the attacker use when waging a watering hole attack?

Site trusted by the end user

A distributed denial-of-service attack in which large numbers of ICMP packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address

Smurf Attack

Captures a system state at a moment in time. Usually used in virtual machines.

Snapshot

Combines processing, memory, networking, and other embedded system components on a single chip

SoC

Manipulating people into divulging information or performing an action that undermines security

Social Engineering

User education is the best defense against

Social Engineering Attacks

Using Authority, Intimidation, Consensus, Scarcity, Urgency, and Familiarity are

Social Engineering tactics

SDN

Software Designed Networking

Security questions are an example of what type of authentication factor?

Something you know

Unsolicited commercial email.

Spam

STP

Spanning Tree Protocol

An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information

Spear Phishing

Spam delivered through instant messaging (IM) instead of through e-mail messaging

Spim

What software development methodology uses four stages in an iterative process?

Spiral

Malware that gathers information without the users knowledge or consent

Spyware

Logging keystrokes, monitoring web browsing, and searching hard drives are all

Spyware techniques

Perform filtering based upon source IP address

Standard ACL

A type of packet filtering that helps to control how data packets move through a firewall. Track open connections.

Stateful Inspection

Watch network traffic, and restrict or block packets based on source and destination addresses or other static values. They are not 'aware' of traffic patterns or data flows

Stateless Inspection

Use automated techniques to analyze code for errors and security flaws without actually executing it

Static Code Testing

Port Security mode. Administrators manually configure valid MAC addresses for each port

Static Port Security

Worm created in 2010. Infiltrated an Iranian Nuclear facility and damaged uranium enrichment equipment.

Stuxnet

Used to determine what subnet an IP address belongs to. Network admins use this to divide the host part of the address into subnets

Subnet Mask

The practice of dividing a network into two or more networks

Subnetting

SCADA

Supervisory Control and Data Acquisition

Responsible for performing all of the NAC-related tasks on behalf of the user and system

Supplicant

What is the piece of software running on a device that enables it to connect to a NAC-protected network?

Supplicant

Layer 2 device. Used to create networks

Switch

Which devices carrie VLANs on a network?

Switch

New devices are connected to a network, but old devices are not promptly disconnected, leading to security vulnerabilities

System Sprawl

SoC

System on a Chip

Connection Oriented Protocol. Guarantees delivery. Uses Flags

TCP

Port 69, Allows a client to get a file from or put a file onto a remote host

TFTP

A security protocol used in the 802.11 wireless networking standard. Designed by the IEEE 802.11i task group and the Wi-Fi Alliance as an interim solution to replace WEP without requiring the replacement of legacy hardware

TKIP

Temporal Key Integrity Protocol

TKIP

Time elapses between authorization and the action

TOCTU

What hardware technology may be embedded in a laptop computer to protect encrypted hard drives from removal?

TPM

Refers to when a person tags along with another person who is authorized to gain entry into a restricted area

Tailgating

Port 23, Unencrypted text communications

Telnet

An application created by a vendor that is different than the manufacturer of the device and/or its operating system

Third Party Application

External force that jeopardizes computers or systems

Threat

Allows organizations to stay current on upcoming cyber security threats

Threat Intelligence

TOCTU

Time of Check/Time of Use

Limits the use of resources during certain hours

Time of Day restrictions

TCP

Transmission Control Protocol

Layer that creates connections between systems and transfers data reliably (TCP/UDP)

Transport

What message can an SNMP agent send to a network management system to report an unusual event?

Trap

TFTP

Trivial File Transfer Protocol

Malware that disguises themselves as another program and will deliver a malicious payload behind the scenes.

Trojan Horse

Verifying correct password, Using a different account to access a service, accessing a different service with the same same account, and investigating authentication logs are ways to

Troubleshoot permission issues

Attack that consists of registering domain names similar to official sites, hoping that users will make a typo and visit their site. Also known as URL Hijacking.

Typosquatting

User Datagram Protocol

UDP

Specification that defines a software interface between an operating system and platform firmware. Replaces BIOS

UEFI

An approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console

UTM

Designed protect users from blended threats while reducing complexity. Describe a category of security appliances which integrates a range of security features into a single appliance

UTM

Unified Threat Management

UTM

UEFI

Unified Extensible Firmware Interface

UTM

Unified Threat Management

Phishing and social engineering are considered

User Based Threats

Connectionless protocol. Does not guarantee delivery. Used for voice and video apps

User Datagram Protocol

Best defense against viruses

User Education

The best way to prevent Social Engineering attacks is

User Education

Rootkit that can run with normal user privileges, are easy to write and difficult to detect

User Mode Rootkit

Allows an employee to connect to a hosted server using a private device

VDI

A method of attacking a network by sending packets to a port that is not normally accessible from a given end system

VLAN Hopping

Limit the unnecessary exposure of VLANs by limiting the number of switches where they are trunked

VLAN Pruning

What technique should network administrators use on switches to limit the exposure of sensitive network traffic?

VLAN Pruning

Extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network

VPN

Type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes

VPN Concentrator

A collection of ports from a set of connected Fibre Channel switches, that form a virtual fabric

VSAN

Virtual Storage Area Network

VSAN

VDI

Virtual Desktop Infrastructure

Separate systems on a network into logical groups based upon function, regardless of physical location

Virtual LAN

Malware that spreads by human action

Virus

Voice phishing attack. An electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities.

Vishing

Program designed to assess computers, computer systems, networks or applications for known weaknesses

Vulnerability Scanner

Filters, monitors, and blocks HTTP traffic to and from a web application

WAF

Web Application Firewall

WAF

Wi-Fi encryption method that uses a static key. The most vulnerable.

WEP

Wireless Equivalent Privacy

WEP

W-Fi Protected Access

WPA

Wi-Fi encryption method that uses TKIP. Also uses RC4 with 128-bit key.

WPA

Wi-Fi Protected Access Version 2

WPA2

Wi-Fi encryption method that uses AES

WPA2

Allows quick wireless setup for devices. Vulnerable due to the unchangeable PIN number

WPS

Wi-Fi Protected Setup

WPS

Gathers the team together for a formal review of the disaster recovery plan

Walk-Through (Tabletop Exercise)

Physical act of seeking out a WiFi network with a mobile device or laptop while driving a vehicle

War Driving

Stocked with all necessary equipment and data but are not maintained. Can be made available in hours or days.

Warm Site

A method of compromise in which malicious actors infect a website with malware that targets users accessing the website

Watering Hole Attack

Identifies sensitive information using electronic tags

Watermarking

What DLP technique tags sensitive content and then watches for those tags in data leaving the organization?

Watermarking

Specifically protect web applications by using application awareness to peer deep into the application layer and block web attacks

Web Application Firewalls

0-1023

Well Known Ports

A type of phishing fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities

Whaling

Type of Penetration Test. Attackers have full knowledge of the network environment.

White Box

In what application control approach may users install only approved software on their devices?

Whitelist

Protects confidentiality, prevents eavesdropping, allows use of insecure transmission methods

Wireless Encryption

IEEE 802.11

Wireless LAN

Malware that can be spread by themselves without human interaction

Worms

What technology can you use as a compensating control when it's not possible to patch an embedded system?

Wrapper

Allows the user to create files and modify their contents

Write

WORM

Write Once Read Many

Cross Site Scripting

XSS

Occur when an attacker embeds malicious scripts in a third party website that are later run by innocent visitors to that site

XSS

A vulnerability in a product that has been discovered by at least one researcher but has not yet been patched by the vendor

Zero Day Vulnerability

What command can administrators use to determine whether the SELinux kernel module is enabled?

getenforce

Command used to test the reach-ability of a host on an Internet Protocol (IP) network

ping

Port Isolation and Private VLANs are

the same

When trying to troubleshoot authentication issues you should

try to use another system first

What Java clause is critical for error handling

try...catch

What command is used to apply operating system updates on some Linux distributions?

yum


संबंधित स्टडी सेट्स

2204 Issues Related to Human Sexuality and Gender Identity, Chapter 20 Sexual Dysfunctions, Gender Dysphoria, and Paraphilias, Chapter 27 - Sexual Disorder & Gender Identity

View Set

(6) BUSN Chapter 6- Organization Design & Structure

View Set

Stocks vs. Bonds, Financial Literacy

View Set