Boson Ceh
442 questions across 0 topics. Use the find bar or section chips to jump to what you need.
Blackboard architecture
a design in which a database or knowledgebase is established to solve a particular problem, it is typically updated by various sources
Service-oriented architecture (SOA)
A software design in which software components deliver information to other components over a network Example: API to give developers access to a database
client/server architecture
A network design in which client computers use a centrally administered server to share data, data storage space, and devices. Example: Server that delivers web pages to a browser
Monolithic Architecture
A design in which a single application is developed to handle components that have functional differences Example: A single application that has both the UI and code to access data.
Which type of malware often needs kernel-level privileges to function?
Rootkit
Bayesian System
????
What is a hash collision?
When a hashing algorithm creates the same hash from different plain text values.
How many bits does MD5's hash have?
128 bit hashes
What is data collision?
When two devices transmit at the same time
False positive generation
A technique that generates a large amount of alert traffic to prevent detection of a legit attack by an IDS
What is session splicing?
An attack that uses fragmentation to avoid an IDS. It breaks session data up to pass it to a host. This way the IDS doesn't see all the attack data at once and may think the data is unrelated Only works on session-based protocols like HTTP
What is IP Address Spoofing?
Changing or disguising the source IP address of an IP packet. Useful to mask the source of a DDoS attack
What is Source Routing?
Sender defines some or all hops a packet must travel through. Enable by enabling loose source routing or strict source routing and providing all IPs to use
What port does telnet use?
TCP Port 23
What port does SMTP use?
TCP PORT 25
What port does DNS use? (DNR)
TCP/UDP Port 53
What does DNS stand for?
It Means Domain Name System
What does DNS do?
It translates web addresses that people use into addresses the Internet uses
What are the 7 categories of controls?
Directive - Company Policy Deterrent - Firing someone for failing it Preventative - Firewall blocking it Compensating - Extra policy on a policy Detective - IDS Corrective - antivirus correcting issues Recovery - antivirus
What does IEEE stand for?
Institute of Electrical and Electronics Engineers
What does 802.1x define to establish port-based NAC?
Extensible Authentication Protocol (EAP)
What does NAC stand for?
It stands for Network Access Control
What does AES stand for?
It stands for Advanced Encryption Standard
What doe AES do?
It is a cryptographic algorithm used in WPA2. After 802.1X is authenticated AES can encrypt communication
What does IPSec mean?
IP Security
What is IPsec used for?
Provides security for VPNs
What parts of the triad does IPSec provide?
Confidentiality - Encrypts before sending Integrity - encryption says if it was tampered with
What does L2TP stand for?
Layer 2 Tunneling Protocol
What is L2TP used for?
Used to establish VPN Connections
What happens to packets with L2TP?
They are encapsulated in UDP packets
What does NIST stand for?
National Institute of Standards and Technology
What does NIST 800-53 do?
Catalogs security and privace controls for federal information systems except those related to Directive Deterrent Preventative Compensating Detective Corrective Recovery NATIONAL SECURITY
What does FISMA stand for?
Federal Information Security Management Act of 2002
What does FISMA do?
Requires all federal agencies to have an Info Sec program It also assigns responsibilities to Office of Management and Budget and NIST
What does FITARA stand for?
Federal Information Technology Acquisition Reform Act (2013)
What does FITARA do?
Provides a framework for US Govt purchases. Was aimed to reduce spending on old systems This act failed
What does HIPAA stand for?
Health Insurance Portability and Accountability Act
What is Libwhisker?
Pearl module that supports IDS evasion Nikto uses libwhisker
What is Nikto?
A General Public License(GPL) web vulnerability scanner that performs multiple checks. Relies on Libwhisker Supports SSL Supports HTTP Supports reporting
What is Burp Suite?
a suite of tools for attacking web applications. Has free and professional versions
What is Nessus?
A proprietary commercial vulnerability scanner. Patch levels Vul of known exploits Has plugins
What are the common DH Groups?
1, 2, 5, 14, 15,16, 17,18
What are the common DH Groups' Modulus sizes?
1 - 768 bit - smallest 2 - 1024 bit - 2 GB 5 - 1536 bit - only with 5 in it 14 - 2048 bit 15 - 3073 bit - 15x2 = 30 16 - 4096 bit 17 - 6144 bit - Matt 17-44 18 - 8192 - Dylan #81 92
What does DH stand for?
Diffie-Hellman an Asymmetric encryption protocol
What is Diffie-Hellman? (hyphen)
An asymmetric encryption protocol that is used to exchange security keys between two parties who have had no previous communication
What is Pcap?
A packet capture library that is used by many packet sniffers and network monitors
What is Pcap used by
It is used by the following: Kismet L0phtCrack Nmap Ngrep Snort Tcpdump Wireshark
Who created pcap?
It was created by the developers of Tcpdump
What is Tcpdump?
the premier network analysis tool for information security professionals. Having a solid grasp of this über-powerful application is mandatory for anyone desiring a thorough understanding of TCP/IP.
What is Libpcap?
a C/C++ version of fpcap used in UNIX systems
What is Winpcap?
Windows based version of libpcap
What is john the ripper?
a password cracking tool
What is cain & abel?
A password cracking tool
What is Kerbcrack?
a password cracking tool
What is L0phtCrack?
As password cracking tool
What is THC-Hydra?
A password cracking tool
What is a network tap?
A method of sitting between a network session's source and destination so that traffic can be captured by a sniffer and analyzed
What is a back door?
Code or credentials that are built into software that give complete access to the workstation it is running on
What is MD5?
A password-hashing algorithm Creates 128bit hash
What does LM mean?
Microsoft's LAN Manager
What is LM?
a hashing technique that converts a users password into uppercase and then adds blank spaces until the size is 14 bytes. The 14 bytes are split into 2x 7byte chunks then each is ran through DES then the two are put back together Used prior to Windows NT
What does DES sta
Data Encryption Standard
What is an NT hash?
a 16 byte MD4 hash of a UTF-16 Unicode password?
What does MD4 mean?
Message Digest 4
What is MD4 susceptible to?
Collision attacks because the hash is so small
What does NTLM stand for?
NT LAN Manager
What is NTLM?
A protocol that uses both an NT hash and an LM hash to store passwords
What does the proxychains command do? What is it used for?
It is used to hide true source IP address of traffic. It is used to evade detection on an IDS
What are linux IP filtering commands?
ipfwadmin ipchains iptables
What commands can be used for IP masquerading on a linux-based firewall?
ipfwadmin ipchains iptables
What is a data owner?
The individual or entity accountable for data
What is a data custodian?
The individual or entity that is responsible for granting access to data
What does OSSTMM stand for?
Open Source Security Testing Methodology Manual
What does OSSTMM do?
Provides protection for operations and can influence the impact of threats
How many types of controls are there in OSSTMM?
10
What are the two control classes in OSSTMM?
Interactive Process Controls
What controls are considered "Class A"in OSSTMM?
Interactive Controls
What controls are considered "Class B" in OSSTMM?
Process Controls
What are the Class A controls in OSSTMM? (RACISm)
Authentication Indemnification Resilience Subjugation Continuity
What are the Class B controls in OSSTMM? (CAtNIP)
Nonrepudiation Confidentiality Privacy Integrity Alarm
What is authentication?
Provides for identification and authorization based on credentials
What is Indemnification?
provides contractual protection against loss or damages
What is resilience?
Protects assets from corruption or failure
What is subjugation?
Ensure that interaction occur according to processes defined by the asset owner
What is continuity?
Maintains interactivity with assets if corruption of failure occurs
What is nonrepudiation?
Prevents a participant from denying its actions
What is confidentiality?
Ensures that only participants have knowledge of an asset
What is privacy?
Ensures that only participants have access to the asset
What is integrity?
Ensures that participants know when assets and processes change
What is alarm?
Notifies participants when interactions occur
How does OSSTMM define legislative, contractual and standards-based?
As types of compliance
What are examples of legislative compliance?
SOX - Sarbanes-Oxley HIPAA - Healthcare Information Portability Accountability
What is an example of Contractual compliance?
PCI DSS - Payment Card Industry Data Security Standard
What is an example of standards-based compliance?
ITIL - Information Technology Infrastructure Library ISO - International Organization for Standardization
What does ISO stand for?
International Organization for Standardization
What does PCI DSS stand for?
Payment Card Industry Data Security Standard
What does ITIL stand for?
Information Technology Infrastructure Library
Who maintains OSSTMM?
ISECOM - Institute of Security and Open Methodologies
What does OSSTMM provide?
a repeatable framework for operational security testing and analysis
What does the OSSTMM framework test?
Human Physical Wireless Telecomms Network security OSSTMM also has a web-app version
What will HTTP PUT do?
Enables HTTP clients to update files to the target system
What will HTTP GET do?
Will report whether GET is supported by the target system
What will HTTP HEAD do?
Will report whether HEAD is supported by the target system
What will HTTP POST do?
Will report whether POST is supported by the target system
What will HTTP OPTIONS do?
Will report whether OPTIONS is supported on the target system
What does xp_cmdshell stored procedure allow for?
It allows for execution of arbitrary calls with the permission of either the SQL Server or proxy account
Who should have access to xp_cmdshell stored procedure?
sysadmin should be the only one with this access
What should you do with guest accounts to meet SQL Server best practices?
Disable guest accounts
What should you do with cross data base ownership chaining to meet SQL Server best practices?
disable it
What permission is "public database role" granted on SQL Server by default?
None
What does IDS stand for?
Intrusion Detection System
What does a port scanner do?
Scan an IP address range to determine open and close ports
What does a network sniffer do?
captures network data as it passes through the network interface
Is a network sniffer passive or active?
Passive
What mode on a NIC is required to capture network data?
promiscuous mode
What does an IDS do?
Can monitor network traffic and examine the traffice for signatures. When it finds a signature it notifies the admin
What is the name of this pane in Wireshark?
Packet Details Pane
What information does the Packet List pane display?
Packet Number Timestamp Source Destination Protocol Length Additional Info
What information does the Packet Details pane list?
Shows the protocols and protocol fields in the packet. Displayed in tree format that can be expanded or collapsed
What information does the Packet Bytes pane show?
Contains hexadecimal characters and data offset (line number)
What does -n in NMAP do?
Disables DNS resolution
What does -R in NMAP do?
Enables DNS resolution
What does -P0 in NMAP do?
Disables ICMP (older parameters)
What does ICMP stand for?
Internet Control Message Protocol
What does -PN in Nmap do?
Disables ICMP (older parameters)
What does -Pn do in NMAP?
Disables DNS
When would you want to disable ICMP pings?
Do this when performing stealth scans to avoid detection
What does the -T parameter in NMAP do?
Configures timing options. Is followed by a number 1-5 (1 is safest and 5 is worst)
What does -T0 do in NMAP?
Sets scan frequencey to "Paranoid scan"
How long does -T0 wait to between each packet?
Waits 5 minutes between each packet
What does -T1 do in NMAP
Sets scan frequency to "Sneaky Scan"
What is the scan frequency of -T1 in NMAP
15 second pause between each packet
What is the scan frequency of -T2 in NMAP
10 second pause between each packet
What is the scan frequency of -T3 in NMAP
10 second pause between each packet
What is the scan frequency of -T4 in NMAP
1.25 second pause between each packet
What is the scan frequency of -T5 in NMAP
.3 second pause between each packet
What is -T2 called in Nmap
It is called Polite Scan in NMAP
What is -T3 called in Nmap
It is called normal scan in NMap
What is -T4 called in Nmap
It is called aggressive scan in Nmap
What is -T5 called in Nmap
It is called Insane Scan in Nmap
What does -sS do in nmap?
It performs a stealth scan in Nmap
What are 2 other names for stealth scan?
SYN scan Half-open scan
What will a target return for an open port in a stealth scan?
SYN/ACK is returned by the target
What will the target return for a closed port in a stealth scan?
RST/ACK
What does the ATTACKING system do when an open port replies during a stealth scan?
It sends an RST response to reset the connection
What does APT mean?
Advanced Persistent Threat
What does APT involve?
The installation of a back door
What are the 3 parts of an APT attack?
Advanced - the techniques that are used Persistent - Remote/permanent control of the system Threat - non-technical, human
What are the 4 phases of a penetration test? (P-DeAR)
Planning Discovery Attack Reporting
What will a project scope document?
Expected results of the project Constraints Any conditions
During a penetration test when would you recommend mitigation of issues?
During the reporting phase
What does IPSec protect against?
MitM Session Replay Data Manipulation
How does IPSec provide data authentication?
Username/Password preshared keys Digital certificates one-time passwords
How does IPSec provide data integrity?
It verifies the checksums at each end of the connection
What layer does IPSec operate at on the OSI model?
Network Layer (Layer 3)
What are the OSI Model Layers?
Physical, - computer Data Link, Network, Transport, Session, Presentation, Application
What does PPTP stand for?
Point-to-Point Tunneling Protocol
What is PPTP used for?
Transferring data across IP-based VPN connections
What OSI layer does PPTP operate at?
Data Link Layer (Layer 2)
What does PPTP use for data transfer security?
Extensible Authentication Protocol (EAP)
What does EAP stand for
Extensible Authentication Protocol
What is L2PT used for?
transferring data across a VPN
How is security for a VPN connection handled in L2PT?
It can use IPSec for VPN connections since it doesn't provide security itself
What OSI layer does L2PT operate at?
Operates at the Data Link layer (Layer 2)
What does GRE stand for?
Generic Routing Encapsulation
What OSI layer does GRE operate at?
Network Layer (Layer 3)
What is GRE used for?
Encapsulates and forwards non-IP protocols such as the below across an IP network. IPX - Internetwork Packet Exchange AppleTalk Uses IPSec to provide encryption and authentication
What RID value indicates the account is an administrator?
RID 500
What RID value indicates the account is a guest account
RID 501
Where do RIDs start to indicate an account is a user account?
RID 1000+
What does SID stand for?
Security Identifier
What does the first component of an SID mean?
That the string is an SID
What does the second component of an SID mean?
The revision onumber of the SID
What does the third component of an SID mean?
a 5 indicates this is an SID for Windows NT authority
What does the fourth component of an SID mean?
the domain or local computer identifier of the SID
What does the fifth component of an SID mean?
This is the relative identified (RID) and identifies the type of user the SID is for
What is a sparse infector virus?
A virus that infect files only when a specific condition is met They execute less frequently to avoid antivirus software
What is a cavity virus?
a virus that overwrites portions of a file, filling the unused areas. This results in an infected file that is the same size as the original
What is a metamorphic virus?
A virus that rewrites itself each time it infects a new file
What is a stealth virus?
A virus that stays hidden by monitoring service calls to the OS. If a call is made to an infected file the original file's attributes are returned to the OS
What is the maximum length of an LM password?
14 characters is the maximum length
How long are all LM passwords?
14 characters. Anything shorter than 14 characters is filled in with blanks
How can you tell if an LM password is 7 of less characters?
The second part of the hash is: AAD3B435B51404EE 404 Page Not FOUND
What language does G++ compile?
Compiles C++
What language has an extension of ".cpp"
C++ extension
What language has an extension of ".js"
Javascript extension
What language has an extension of ".pl"
Pearl extension
What language has an extension of ".py"
Python extension
What does -o do in a g++ command?
defines an output executable g++ gotcha.cpp -o clickme.exe compiles gotcha.cpp into clickme.exe
What are some popular C++ file extensions?
.C .cc .cpp .CPP .c++ .cp .cxx .hh .hpp .H .ii .tcc
What mechanism can session splicing exploit to evade an IDS
data fragmentation can be used in this to evade an IDS
What is a buffer overflow attack?
Putting more data in a buffer than it can hold which allows an attacker to execute malicious code on the computer
What is C++ particularly vulnerable to?
It is particularly vulnerable to overflow attacks
What is IP checksum validation?
Used to provide limited amount of data integrity for IP datagrams. When a host receives an IP datagram it calculates the checksum of the header and compares it to the value of the header's checksum. If they don't match it is discarded
What does NAT stand for?
Network Address Translation
What does NAT do?
translates Private IP addresses to Public IP addresses and Public IP addresses back to Private IP addresses. is a many-to-many mapping
What does Dynamic NAT do?
Maintains a pool of public IP addresses and assigns them to devices with a private IP address on an as-needed basis. As communication sessions close the public IPs are put back in the pool for use
What is static NAT?
a one-to-one mapping between private IPs and public IPs
What does PAT stand for?
Port Address Translation Many-to-one mapping
How often does TCPView update by default?
Updates every second by default
How do you modify refresh rates for TCPView?
Selcting VIEW->UPATE SPEED
What are the possible refresh reates for TCPView?
1 second 2 seconds 5 seconds Paused
What is TCPView?
a host-based tool that displays Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) connections between the host and destination devices
What information does TCPView display?
It displays Process ID Protocol Local and remote address Local and remote port Connection state number of sent and received packets number of sent and received bytes Devices can be displayed by host name or by ip address
What OS does TCPView operate on?
It only operates on Windows
What OS does Netstat operate on?
It operates on Windows, Linux and UNIX systems
What is a TCPView alternative with command-line functionality?
Tcpvcon is a command-line alternative
What does tcpvcon -a do?
Runs tcpvcon and displays all end points
What does tcpvcon -c do?
prints the output of tcpvcon as a comma-separated CSV
What does tcpvcon -n do?
configures tcpvcon to not resolve addresses
What protocol is a Fraggle attack specific to?
This attack is specific to UDP
What is a fraggle attack?
This attack is a denial-of-service (DoS) attack that involves sending a large amount of spoofed UDP traffic to a router's broadcast address within a network. It is very similar to a different attack which uses spoofed ICMP traffic rather than UDP traffic to achieve the same goal.
What protocol is a Sequence Prediction attack specific to?
TCP
What is a sequence prediction attack?
When an attacker can guess the next sequence number from the legit sender to a host.
What is a smurf attack?
An attack that uses ICMP Echo Requests with a spoofed source address to a broadcast address. All that receive the request ping back but is directed to the DoS target
What does a multipartite virus do?
A virus that attempts to infect the boot sector and various files and programs
What does a macro virus do?
A virus that infects MS templates by using on-board VBA to run commands
What does the DROP command do in SQL?
Deletes a table EX DROP TABLE customer_table
What does the EXEC command do in SQL?
Executes a command string on a database
What does the UPDATE command do in SQL?
Allows you to update values in a SQL database
What does GLBA stand for?
Gramm-Leach-Bliley Act
What does GLBA do?
Protects the confidentiality and integrity of personal information that a financial institution collects. Also requires the institution to disclose their privacy practices to the customer
What does TCSEC stand for?
Trusted Computer System Evaluation Criteria AKA Orange Book
What does TCSEC do?
Provides guidance on evaluating the effectiveness of computer security controls
What are the 4 divisions of security included in TCSEC
A - verified protection B - Mandatory protection C - Discretionary Protection D - Minimal protection
What does the 'net user' command do?
Allows you to manage user accounts on a Windows command prompt
What does the 'net start' command do?
This command starts a service on a Windows command prompt
What does the 'net pause' command do?
This command pauses a service on a Windows command prompt
What does the 'net use' command do?
This command connects to a remote resource on a Windows command prompt
What does the 'net' command do?
This command allows you to manage different aspects of services on a windows command prompt
What does the -I flag do in Netcat?
This flag configures Netcat to accept inbound connections on a UNIX host
What does the -L flag do in Netcat?
This command configures Netcat to listen for inbound connections and restart after a session terminates. Only available in Windows
What does the -p flag do in Netcat?
This flag specifies a TCP port in Netcat
What does the -e flag do in Netcat?
This flag specifies the program to run when a session is established in Netcat
What does the -u flag do in Netcat?
This Netcat flag specifies a UDP Port
What layer do application-level firewalls operate at in the OSI model?
Operate at Layer 7 (Application Layer)
What layer do circuit-level firewalls operate at in the OSI model?
Operate at Layer 5, Session Layer
What layer do packet-filtering firewalls operate at in the OSI model?
Operate at Layer 3 Network Layer
What OSI layer do Stateful multilayer inspection firewalls operate at?
Multiple OSI layers They combine Packet-filtering circuite-level application-level techniques
What does ESP stand for?
Encapsulating Security Payload
What does ESP do in IPSec in tunnel mode?
It encrypts the entire IP packet in IPSec when in tunnel mode
In IPSec transport mode what is encrypted by ESP?
Only the IP payload is encrypted by ESP in this mode
What does AH stand for?
Authentication Header
What does AH provide?
Authentication and Integrity is provided
Does AH encrypt data?
No, AH doesn't encrypt data
What are the steps to create an encrypted message that contains a digital signature using PKI technology?
Create a hash of the message Encrypt the hash using your private key Encrypt the message with the recipients public key
What are the three types of authentication?
Something you have Something you know Something you are
What is steganography?
a cryptography method in which data is hidden in another media type
What is an overt channel?
A transmission that is authorized and is performed in compliance with security policies
What is a covert channel?
A transmission that violates a company's security policy. Often used to mask transmissions
What does MTD stand for?
Maximum Tolerable Downtime
What does DRP stand for?
Disaster recovery plan
What does IRC stand for?
Internet Relay Chat
What technology is most commonly associated with botnets?
IRC Is most common
What is the BCP Development process?
Develop BCP Policy Conduct BIA Identify controls Develop recovery strats Develop an IT DRP Perform DRP training Perform BC/DR maintenance
How long should policies be?
As short as possible
How specific should security policies be?
Not specific
What type of document should have "must" and "will" statements?
Policies have these words
Who should endorse policies?
Senior Management should endorse them or they'll fail
What type of document has words like "should" and "may?"
Guidelines have these types of words
What does SMB stand for?
Server Message Block
What is SMB used for?
Enables file and printer sharing without the need for NetBIOS port broadcasting
What port does POP3 use?
TCP Port 110
What does POP3 mean?
Post Office Protocol v3
What port does BGP use?
TCP port 179
What does BGP stand for?
Border Gateway Protocol
What does BGP do?
It is an exterior gateway protocol that can be used to exchange routing info between network providers
What does POP3 do?
It is used by mail clients to retrieve email from a remote server
What does SNMP stand for?
Simple Network Management Protocol
What does SNMP do?
It is used to monitor and manage network devices
What port does SMB use?
TCP/UDP Port 445
What port does NetBIOS use?
TCP Port 139
What layer does HTTP operate at?
Application Layer (Layer 7)
What layer do packet sniffers operate at?
Layer 2 (Network layer)
What does STP stand for?
Spanning Tree Protocol
What layer does STP operate at?
Layer 2 (data link)
What layer does TCP operate at?
Layer 4 (Transport)
What does SOCKS mean?
Secure Sockets
What layer does SOCKS operate on?
Layer 5 (session)
What does a hybrid attack do?
It uses a list of words (like dictionary) but substitutes numbers and symbols for some characters
What does a dictionary attack do?
It used a list of words from a "dictionary" to attack
What does a single quote (') mean in SQL?
It denotes a character string in SQL
What does two hyphens (--) mean in SQL?
Denotes a commend in SQL
What does the plus (+) mean in SQL?
It can concatenate two strings together
What does the at sign (@) mean in SQL?
Denotes a variable in SQL
What does the L parameter do for grep?
Searches for files that DO NOT contain the search term at the beginning of the name in grep
what does the e parameter do in grep?
It configures grep to accept a regular expression pattern as a search term
What does the ^ parameter do in grep?
It configures grep to match only the beginning of the line to the search term
What is a false positive?
When something that shouldn't trigger an alert does
What is a false negative?
When something that should trigger an alert doesn't
What port does DNS use?
TCP/UDP 53
When should you use a proxy server?
You should use this when you want to filter internet traffic for internal hosts on the network
When should you use a web server?
You should use this when you want to allow customers to access your website
What does DHCP stand for?
Dynamic Host Configuration Protocol
What should you use if you want to provide IP addresses to a client's computer?
You should use DHCP for this
What should you use to detect unauthorized access to a network?
an IDS
What does cryptography provide?
confidentiality, integrity, authentication, & Non-repudiation
What does ALE stand for?
Annualized Loss Expectancy
How do you calculate ALE?
ALE = SLE x ARO
What does ARO stand for?
Annualized Rate of Occurrence
What does SLE stand for?
Single Loss Expectancy
What does NTP stand for?
Network Time Protocol
What port does NTP use?
UDP Port 123
What does FTP stand for?
File Transfer Protocol
What port does FTP use?
TCP Ports 20, 21
What port does SNMP use?
UDP Port 161 and 162
What does IPP stand for?
Internet Printing Protocol
What port does IPP use?
TCP Port 631
What does IPP do?
It is used to print to a network printer
What does LAND stand for?
Local Area Network Denial
What does a LAND attack do?
It uses malformed IP packets with the same source and destination address. When the victim receives the packet it can become confused and crash
What is a TEARDROP Attack?
Uses several large overlapping IP fragments. The system will try to reassemble them but they're too big and sometimes crash
What does a "Birthday Attack" exploit?
This attack finds two passwords with the same hash
What is a logic bomb?
Malicious code that wait for triggers to go off before activating Dates Times
What does the Computer Fraud and Abuse Act target?
Targets the deterring and prosecution of computer crimes against government systems, financial systems or systems that operate internationally
What is the financial trigger for the Computer Fraud and Abuse Act?
$5000 over 1 year
What does ECPA mean?
Electronic Communications Privacy Act
What did ECPA do?
Protects electronic communications from illegal wiretapping
What is the Patriot Act?
This act made it legal for the government to access internet communications, medical records, and even your home, all without notice or a search warrant.
What is a linux GUI-based tool for generating TCP/IP packets?
packETH
What is Nemesis?
A command-line tool for generating packets that is available on Linux and Windows
What is Hping?
A command-line tool that can generate TCP/IP packets. Available on all platforms
What is THC Hydra?
A dictionary attack tool
What is an interrupt?
Signal from hardware or software indicating that an event has occurred or that a process needs attention
What is a Threat in the risk equation?
This is the frequency or rate of a potential negative event
What is a vulnerability in the risk equation?
The likelihood that a threat will happen
What is cost in the risk equation?
Describes the damage of a successful attack
What is the risk equation?
Threat x Vulnerability
What type of encryption is excellent for bulk data?
Symmetric encryption is excellent for this
What port does syslog use?
UDP Port 514
What size hash does MD5 create?
This algorithm creates hashes that are 128-bits long
What size hash does SHA-1 create?
This algorithm creates a hash that is 160-bits long
What does SHA mean?
Secure Hash Algorithm
What are procedure documents?
Mandatory low-level guides that explain how to accomplish a task
How much detail should procedure documents have?
This document should have as much details as possible
What is a baseline document?
Provides a minimum level of security that a company's employees and systems must meet
What are guidelines?
Provides helpful bits of advice
What does a firewall rule between two IP addresses mean?
It allows any device from one to connect to any device on the other
What type of language is python?
This is a scripting language
What are examples of compiled languages?
C++ Java Visual Basic
What organization maintains WebGoat?
OWASP OPen Web App Security Project
What is COBIT?
COBIT = Objectives for Information and related Technology. It is a framework for IT and IT governance that provides a systematic way of integrating IT with business strategy and business risk
What does COBIT do?
It categorizes control objectives into four domains Planning & Organization Acquisition & Implementation Delivery & Support Monitoring & Evaluation
What does ISECOM maintain?
OSSTMM
What is Nslookup?
This command line command enables you to determine domain names and their IP addresses.
What does the nslookup command "ls -d" do?
This nslookup command lists all records for the specified DNS domain by initiating a zone transfer
What does the nslookup command "ls -t ANY" do?
This nslookup command lists all records for the specified DNS domain by initiating a zone transfer
What does the nslookup "ls -a" do?
This nslookup command lists aliases of computers in the DNS domain
What does the nslookup "ls -t CNAME" do?
This nslookup command lists aliases of computers in the DNS domain
What does the nslookup "ls -h" do?
This command lists CPU and OS information for the DNS domain
Waht does the nslookup "ls -t HINFO" do?
This command lists CPU and OS information for the DNS domain
What does the nslookup "ls -s" do?
This nslookup command lists well-known services on the DNS domain
What does the nslookup "ls -t WKS" do?
This nslookup command lists well-known services on the DNS domain
What is a multihomed device?
a devices that has more than one network connection
What does OSI mean?
Open Systems Interconnection
What kind of firewall can hide the source of network connections?
Proxy firewalls can do this
What type of firewall operates at Layer 7?
Application-level firewalls
What does 3DES mean?
Triple Data Encryption Standard
What does 3DES do?
It applies DES three times
How long is a 3DES key?
it produces a 168 bit key
How long is a DES key?
produces a 56 bit key
What is the recommended length for RSA keys?
2048 bits and up
What encryption supports 4096 it keys?
RSA Encryption supports this
What does an antivirus do?
It is used to prevent viruses from infecting a network
What is a zombie master used for?
It is used to control other computers on a botnet
What can be used to prevent internal users from accessing external networks?
Firewalls and proxy servers can be used to prevent this
What does ARP stand for?
Address Resolution Protocol
What does ARP do?
Converts IP address to MAC Address
What does RARP do?
Converts MAC addresses to IP Addresses
What does the cross-certification trust model do?
It enables participants to trust another participant's Public Key. Trust is established between the two.
What does the trusted third-part model do?
a third party establishes trust for the two wanting to communicate
What is another name for the bridge model?
This is also known as trusted third-party model
What is another name for trusted third-party model?
This is also known as the bridge model
What does XSS mean?
Cross-Site scripting
What is XSS?
When an attacker gets a victim to execute client-side code on a web app/site
What security method adheres to the entire IEEE 802.11i standard?
WPA2 Adheres to this entire standard
What is the IPv4 loopback address?
It is 127.0.0.1
What is 255.255.255.255?
It is a Layer 3 limited broadcast address
What is 192.168.0.255 an example of?
it is an example of a layer 3 directed broadcast address
What is FF:FF:FF:FF:FF:FF an example of?
It is an example of a Layer 2 ethernet broadcast address
What is a blue-team?
A group of security responders who are responsible for mitigating attacker activities and have access to all of an orgs information during a simulated attack
What is a red-team?
A group of security responders who are responsible for mounting attacks against an organization as part of an attack simulation
What are gray-box testers?
A pentester who has the same network knowledge as an employee
What are black-box testers?
A pentester who has no network knowledge
What is the primary benefit of signature-matching IDSs?
Their main benefit is that they have a low false positive rate
What is the primary benefit of anomaly-detection IDSs?
Their main benefit is being great at detecting new security threats
What encryption does WPA2 use?
It used AES-CCMP for encryption
What does AES-CCM stand for?
Advanced Encryption Standard-Counter Mode with Cipher Block Message Authentication Code Protocol
What does WPA use for encryption?
It uses TKIP for encryption
What does TKIP stand for?
Temporal Key Integrity Protocol
How long is TKIPs encryption?
Its encryption is 128-bit
Which encryption algorithm uses factors of prime numbers?
RSA
What security standard is based on BS 7799 and is focused on security governance?
ISO 27001 is based on this
What standard is ISO 27001 based on?
BS 7799
Who created COBIT?
Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI)
What is ISO 27001 focused on?
This standard is focused on governance for IT security
What attack typically uses an IFrame?
Clickjacking
What is clickjacking?
When an attacker places invisible links over legit links that intercept mouse clicks. The mouse clicks are then directed to the attacker's desired use
What is a watering hole attack?
A malicious attack that is directed toward a small group of specific individuals who visit the same website.
What is the primary goal of VAWTRAK?
This attack's main goal is to steal online banking information
What method does VAWTRAK use to infect?
Typically uses email messages with trojans as attachments
What is malvertising?
An advertisement that is infected with a virus
What does gpedit.msc do?
This command launches Microsoft Management Console (MMC) and initiates the Group Policy snap-in
What does compmgmt.msc do?
This command launches MMC with Computer Managment snap-in initiated
What does services.msc command do?
Launches MMC with services snap-in initiated. It allows you to see running services and modify whether those star manually or automatically
What does the eventvwr.msc command do?
It enables MMC with the Event Viewer enabled. It allows you to examine windows host's event logs, application logs, security logs and system logs
What is Firewalk?
It is a tool that is used to determine what ports are filtered by a gateway firewall
What does Firewalk manipulate?
It manipulates Time-to-live values so they expire one hop after the firewall
If Firewalk received "TTL expired in transit" what does that generally mean?
Firewalk assumes the port is open and unfiltered
If firewalk receives an unreachable message what does it assume?
Firewalk assumes the port is filtered
What does Firewalk do if it receives no response?
It assumes the port is filtered
What is fuzz testing?
Supplying completely random data to the object to see what it does
What is Fuzz testing a part of?
Microsoft Security Development Lifecycle
When would you use tcp-over-dns?
You would use this to evade firewall inspection
What would you use Hping2 for?
You would use this to craft packets
What would you use Angry IP Scanner for?
To perform ping sweeps
What does CSRF stand for?
Cross-Site Request Forgery
What does the btmp file show?
It show a list of failed login attempts on a linux computer
What does the utmp file contain?
It shows a list of currently logged in users on a linux system
What does the wtmp file contain?
It contains a list of all login and logout activity on a linux system
What does the file auth.log contain?
It contains system authorization information on a linux system
Where is the auth.log file found?
/var/log
What does CA stand for?
Certificate Authority
What does a CA do?
It issues digital certificates
What is a trusted third party in PKI called?
Certificate Authority (CA)
What does CRL stand for?
Certificate Revocation List
What does S/MIME stand for?
Secure/Multipurpose Internet Mail Extensions
What assesses the effectiveness of a security policy's implementation?
A Security Audit does this
What attempts to pinpoint vulnerabilities without exploiting them?
A Vulnerability Assessment does this
What tests an organization's security by attempting to exploit vulnerabilities?
A penetration test does this
What does the -d flag do in metagoofil?
Indicates the target website in metagoofil
What does the -t flag do in metagoofil?
It indicates the file type in metagoofil
What does the -f flag do in metagoofil?
It indicates the output file in metagoofil
What does the nmap command -O do?
This Nmap command indicates OS detection
What does the nmap command -sV indicate?
This nmap command indicates version scanning
What does the nmap command -sC indicate?
This nmap command indicates Script scanning
What nmap command indicates traceroute?
--traceroute
What does the -A command indicate in nmap?
This command does OS detection Script scanning Version scanning
What will sc query type=all show you?
This will show you information on drivers and services but only active services
What will sc query state=all show you?
This will show you all active and inactive services on Windows Server 2012
What does the ampersand (&) do in a linux command?
It indicates the process should run in the background on a linux machine
How do you make a process continue after the user logs out of a linux machine?
add nohop to the front of the command
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials