QUESTIONS WITH SOLUTIONS GRADED A+
◍ nmap.
Answer: A well-known port scanner that can also search for hosts on a
network, identify the operating systems those hosts are running, detect the
version of the services running on any open ports, and more
◍ Confidentiality.
Answer: the act of holding information in confidence, not to be released to
unauthorized individuals-a necessary component of privacy
◍ SDL Regex Fuzzer.
Answer: A tool developed by Microsoft for testing certain pattern-matching
expressions for potential vulnerabilities
◍ kismet.
Answer: a well-known Linux sniffing tool used to detect wireless access
points
◍ network segmentation.
Answer: The act of dividing a network into multiple smaller networks, each
acting as its own small network (subnet)
◍ flash media.
Answer: storage media that is least sensitive to temperature, humidity,
magnetic fields, and impacts
◍ packet filtering.
Answer: A firewall technology that inspects the contents of each packet in
network traffic individually and makes a gross determination (based on
source and destination IP address, port number, and the protocol being used)
of whether the traffic should be allowed to pass
,◍ BinScope Binary Analyzer.
Answer: A tool developed by Microsoft to examine source code for general
good practices
◍ SATE (Security Awareness, Training and Education).
Answer: a program that seeks to make users aware of the risk they are
accepting through their current actions and attempts to change their behavior
through targeted efforts
◍ client-side attack.
Answer: A type of attack that takes advantage of weaknesses in the software
loaded on client machines or one that uses social engineering techniques to
trick us into going along with the attack
◍ denying access.
Answer: an act that prevents a party from accessing something, such as
logging on to a machine or entering the lobby of our building after hours
◍ use of personal equipment.
Answer: security awareness issue that is concerned with protecting a
company's assets
◍ preparation phase.
Answer: The risk management phase that consists of all of the activities that
we can perform in advance of the incident itself, in order to better enable us
to handle it
◍ CA (certificate authority).
Answer: a trusted entity that handles digital certificates
◍ residual data.
Answer: Data that is unintentionally left behind on a storage device
◍ data in use.
Answer: This type of data is the hardest to protect
◍ Safety, evacuation plans, administrative controls.
Answer: Name the 3 main considerations for protecting people
, ◍ data in motion.
Answer: This type of data is best protected by protecting the data itself
(using SSL, TLS) and protecting the connection (using IPsec VPN, SSL
VPN)
◍ post-incident activity phase.
Answer: The risk management phase where we determine specifically what
happened, why it happened, and what we can do to keep it from happening
again
◍ availability, residual data, backups.
Answer: Name the 3 main considerations for protecting data
◍ administrative controls.
Answer: based on rules, laws, policies, procedures, guidelines, and other
items that are "paper" in nature
◍ eradication.
Answer: to completely remove the effects of the issue from our environment
◍ firewall.
Answer: a mechanism for maintaining control over the traffic that flows into
and out of our networks
◍ 6 main hardening categories.
Answer: 1. Removing unnecessary software2. Removing or turning off
unessential services3. Making alterations to common accounts4. Applying
the principle of least privilege5. Applying software updates in a timely
manner6. Making use of logging and auditing functions
◍ Sun Tzu.
Answer: A Chinese military general from 6th century BC who wrote The
Art of War, a text that shows early examples of operations security
principles
◍ modification attack.
Answer: An attack that involves tampering with our assets-primarily affects