Network Security and Incident Response
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which data type is protected through hard disk encryption?

  • Data at rest (correct)
  • Data in process
  • Data in use
  • Data in transit
  • Which protocol should you use to encrypt configuration files in transit over an unsecured network?

  • TFTP
  • SSH (correct)
  • Telnet
  • HTTP
  • What does a Warning severity message from a DNS server indicate?

  • The server has a hardware error that does not require immediate attention
  • The DNS server is unusable due to a severe malfunction and is shutting down
  • An error condition is occurring that must be addressed immediately (correct)
  • A condition exists that will cause errors in the future if the issue is not fixed
  • Where should you go to view the scan result after completing a full scan of a Windows 10 PC?

    <p>Windows Security (C)</p> Signup and view all the answers

    What action should you take to determine if a suspicious URL is malicious?

    <p>Submit the URL to a threat intelligence portal for analysis (D)</p> Signup and view all the answers

    What should you do when the company intranet site isn't accepting login information and shows misspellings?

    <p>Restore a backup copy of the authentication database (A)</p> Signup and view all the answers

    What does the CVSS tool primarily assist with in Vulnerability Management?

    <p>Evaluating the severity of vulnerabilities (A)</p> Signup and view all the answers

    Which cybersecurity tool would likely be used for patch management?

    <p>Patch Management Software (D)</p> Signup and view all the answers

    What does the Listening state indicate about the TCP ports when using the netstat -l command?

    <p>The ports are open on the system and are waiting for connections. (B)</p> Signup and view all the answers

    Which NIST incident response lifecycle phase focuses on mitigating the impact of an incident?

    <p>Containment, Eradication and Recovery (C)</p> Signup and view all the answers

    What is the primary function of a hypervisor in a virtualized environment?

    <p>It creates and runs virtual machines. (D)</p> Signup and view all the answers

    Which process allows the network security team to monitor the operating system version and updates on devices?

    <p>Security policies and procedures. (A)</p> Signup and view all the answers

    What type of entry should be created to prevent spoofing of the internal network?

    <p>An ACL. (D)</p> Signup and view all the answers

    Which two private IPv4 addresses are typically blocked on the internet for security reasons? (Choose 2)

    <p>192.168.18.189 (A), 172.18.100.78 (D)</p> Signup and view all the answers

    During a risk evaluation, which risks related to a web server should be considered?

    <p>Hardware failure and software failure. (D)</p> Signup and view all the answers

    In the context of incident response, what is the primary focus of the post-incident activity phase?

    <p>Reporting the cause and costs of the incident. (A)</p> Signup and view all the answers

    What immediate action should be taken to scan affected workstations and remove malware?

    <p>Scan affected workstations and remove malware (B)</p> Signup and view all the answers

    What does the command 'ls -l' do in a Linux terminal?

    <p>To display the file permission and ownership of the executable file (C)</p> Signup and view all the answers

    Which device is most appropriate for filtering websites available to employees on the company network?

    <p>Proxy server (A)</p> Signup and view all the answers

    What term best describes a weakness that potentially exposes organizations to cyber attacks?

    <p>Vulnerability (D)</p> Signup and view all the answers

    Which action should be classified under containment when addressing a worm infection?

    <p>Remove or block infected system from the network (B)</p> Signup and view all the answers

    What is the potential for loss, damage, or destruction classified as?

    <p>Risk (C)</p> Signup and view all the answers

    What treatment approach involves cleaning and patching the infected system?

    <p>Mitigation (D)</p> Signup and view all the answers

    Which type of endpoint attack is characterized by overwhelming a service with excessive traffic?

    <p>DDoS (C)</p> Signup and view all the answers

    Which action likely caused the hacker to gain root access on a Linux server?

    <p>Accessing the server as a guest (A)</p> Signup and view all the answers

    Which wireless encryption technology relies on AES for securing home networks?

    <p>WPA2 (B)</p> Signup and view all the answers

    Which of the following is NOT considered an authentication factor in a multifactor authentication scenario?

    <p>Something you earn (C)</p> Signup and view all the answers

    What is an example of corrective measure control in cybersecurity?

    <p>Restoring a system after an event (A)</p> Signup and view all the answers

    Which two disasters would necessitate a company's implementation of a disaster recovery plan?

    <p>Volcanic eruptions (A), Floods (B)</p> Signup and view all the answers

    What should be done if a laptop user cannot print to their wireless printer after an OS update?

    <p>Install a new device driver for the wireless printer (A)</p> Signup and view all the answers

    Which activity exemplifies active reconnaissance during a penetration test?

    <p>Performing an Nmap port scan on the LAN to determine types of connected devices and open ports (B)</p> Signup and view all the answers

    An analyst accesses employee data on a company server without authorization. This action is considered:

    <p>A breach of the cybersecurity code of ethics (A)</p> Signup and view all the answers

    Which framework is primarily responsible for protecting healthcare information of individuals?

    <p>HIPAA (C)</p> Signup and view all the answers

    What type of cybersecurity threat is indicated by repeated website crashes after restarting?

    <p>Denial of service (D)</p> Signup and view all the answers

    Which command can display the configured DNS server information and resolve a URL's IP address?

    <p>Nslookup (B)</p> Signup and view all the answers

    What type of authentication is demonstrated by entering a strong password along with a 5-digit code sent to your smartphone?

    <p>Multifactor (A)</p> Signup and view all the answers

    What does the process of hashing primarily ensure for communication?

    <p>Data integrity (D)</p> Signup and view all the answers

    Which of the following protects the personal information of members of the European Union?

    <p>GDPR (C)</p> Signup and view all the answers

    In the event of an alert concerning malicious files detected by the IDS, what is the recommended next step?

    <p>Log the alert and watch for a second occurrence (A)</p> Signup and view all the answers

    Which framework is responsible for protecting information about individuals stored by federal agencies?

    <p>FISMA (A)</p> Signup and view all the answers

    Which two actions should be taken immediately regarding telnet access on the corporate database server? (Choose 2)

    <p>Implement SSH access on the server. (A), Disable telnet access on the server. (B)</p> Signup and view all the answers

    Which activity by an adversary is an example of an exploit attempting to gain credentials?

    <p>Sending an email with a link to a fictitious web portal login page. (A)</p> Signup and view all the answers

    What is one basic metric to consider when assigning a severity to a vulnerability during assessment?

    <p>The impacts that an exploit of the vulnerability will have on the organization. (A)</p> Signup and view all the answers

    Which two disadvantages of public vulnerability databases should be noted? (Choose 2)

    <p>Threat actors can access the databases to learn how to vary their threats to avoid detection. (C), They lack comprehensive coverage of all vulnerabilities. (D)</p> Signup and view all the answers

    What type of events do application logs contain?

    <p>Events from programs running on the device. (D)</p> Signup and view all the answers

    Which action should NOT be taken when evaluating vulnerabilities?

    <p>Ignore historical data related to previous exploits. (A)</p> Signup and view all the answers

    Which log type records the success or failure of audit policy events?

    <p>Security logs (C)</p> Signup and view all the answers

    What should be a primary focus when considering a vulnerability's potential for exploitation?

    <p>The likelihood of an adversary exploiting it. (A)</p> Signup and view all the answers

    Flashcards

    Listening state (netstat -l)

    TCP ports are open and waiting for incoming connections.

    NIST Incident Response Lifecycle - Mitigate Impact

    Minimizing damage from an incident, repairing damage, and lessening impact.

    NIST Incident Response Lifecycle - Report Cause

    Determine and document the reason(s) for an incident, associated costs, and steps to prevent it again.

    NIST Incident Response Lifecycle - Detection & Analysis

    Identify unusual activity, determine if it's malicious, and issue warnings.

    Signup and view all the flashcards

    Hypervisor function

    Creates and manages virtual machines (VMs).

    Signup and view all the flashcards

    Asset Management (in cybersecurity)

    Tracking operating systems, updates, and patches on devices.

    Signup and view all the flashcards

    Preventing Internal Network Spoofing?

    NAT (Network Address Translation) rules block spoofing attempts to the internal network. Use of NAT rule is recommended.

    Signup and view all the flashcards

    Private Class IP Addresses

    192.168.x.x and 172.16.x.x are private networks, not routable on the internet, to prevent issues.

    Signup and view all the flashcards

    Data at Rest

    Data stored on a hard drive or other storage medium.

    Signup and view all the flashcards

    Data in Transit

    Data being transmitted across a network, like when you send an email or browse the internet.

    Signup and view all the flashcards

    SSH Encryption

    A protocol that encrypts data transferred over a network, ensuring secure communication.

    Signup and view all the flashcards

    DNS Server Warnings

    Messages from a DNS server indicating potential problems that need attention.

    Signup and view all the flashcards

    Vulnerability Management Process

    A structured process for identifying, prioritizing, and mitigating vulnerabilities in systems and applications.

    Signup and view all the flashcards

    Windows Security: Scan Results

    The location in Windows 10 where you can view the results of a security scan.

    Signup and view all the flashcards

    Threat Intelligence Portal

    A service that analyzes suspicious URLs and other online threats for you.

    Signup and view all the flashcards

    DNS Server Accuracy

    Checking if the company's intranet website is correctly registered in the local DNS server.

    Signup and view all the flashcards

    Worm Mitigation: Treatment

    Actions taken to address the problem of infected systems, such as cleaning and patching them to remove the worm and restore functionality.

    Signup and view all the flashcards

    Worm Mitigation: Containment

    Steps taken to prevent the spread of the worm further, often involving isolating infected systems from the network to limit exposure.

    Signup and view all the flashcards

    Worm Mitigation: Inoculation

    Protecting uninfected systems by applying patches or updates to address vulnerabilities exploited by the worm, preventing further infection.

    Signup and view all the flashcards

    Worm Mitigation: Quarantine

    Segmenting the network to restrict the worm's spread to already infected areas, protecting uninfected parts.

    Signup and view all the flashcards

    ls -l Command

    A Linux command used to display detailed information about files and directories, including permissions, ownership, and file size.

    Signup and view all the flashcards

    Cybersecurity Term: Asset

    Anything of value that an organization wants to protect, including people, property, or data.

    Signup and view all the flashcards

    Cybersecurity Term: Threat

    Anything that could potentially cause harm or damage to an asset, like a virus or a hacker.

    Signup and view all the flashcards

    Cybersecurity Term: Risk

    The likelihood of a threat exploiting a vulnerability, leading to harm or loss of an asset.

    Signup and view all the flashcards

    Buffer Overflow Attack

    An attack where an attacker sends more data than the system can handle, overflowing the buffer and potentially overwriting critical memory locations, leading to crashes or malicious code execution.

    Signup and view all the flashcards

    DDoS Attack

    A cyberattack where multiple compromised devices (botnet) bombard a target server with traffic, overwhelming its resources and making it unavailable to legitimate users.

    Signup and view all the flashcards

    Privilege Escalation

    An attack where an attacker gains elevated access to a system, allowing them to perform actions they shouldn't be allowed to, such as accessing sensitive data or changing system settings.

    Signup and view all the flashcards

    Brute Force Attack

    An attack where an attacker tries to guess passwords or other credentials by repeatedly trying different combinations.

    Signup and view all the flashcards

    WPA2 Encryption

    A wireless encryption standard that offers strong security using the Advanced Encryption Standard (AES) algorithm. It's considered a significant improvement over WEP and WPA.

    Signup and view all the flashcards

    Multi-factor Authentication

    A security mechanism that requires users to provide multiple forms of authentication (e.g., something you know, something you have, something you are) to verify their identity.

    Signup and view all the flashcards

    Telnet Security Risk

    Using telnet to access a database server is insecure because data is transmitted unencrypted, making it vulnerable to eavesdropping and attacks.

    Signup and view all the flashcards

    Exploiting Credentials

    An adversary attempting to gain credentials may use tactics like sending phishing emails with fake login pages to trick users into revealing their passwords.

    Signup and view all the flashcards

    Windows Event Logs: Application Logs

    Application logs record events related to software running on the device, including software errors, warnings, and information.

    Signup and view all the flashcards

    Windows Event Logs: System Logs

    System logs contain information about operating system events like updates, installations, and critical system actions.

    Signup and view all the flashcards

    Vulnerability Severity: Exploit Likelihood

    When assessing a vulnerability, consider the likelihood that an attacker could exploit it.

    Signup and view all the flashcards

    Vulnerability Severity: Impact

    During a vulnerability assessment, consider the potential impact if the vulnerability were exploited.

    Signup and view all the flashcards

    Public Vulnerability Databases: Threat Actor Advantage

    Attackers can use publicly available vulnerability databases to learn how to exploit vulnerabilities and avoid detection.

    Signup and view all the flashcards

    Secure Remote Access: SSH

    SSH (Secure Shell) is a secure protocol for remote access and data transfer, using encryption to protect data during transmission.

    Signup and view all the flashcards

    What does GDPR protect?

    The General Data Protection Regulation (GDPR) protects the personal information of individuals within the European Union. This includes data like names, addresses, and online activity.

    Signup and view all the flashcards

    What is the purpose of HIPAA?

    The Health Insurance Portability and Accountability Act (HIPAA) safeguards the medical information of individuals in the United States. This includes health records, billing information, and patient diagnoses.

    Signup and view all the flashcards

    What does PCI-DSS protect?

    The Payment Card Industry Data Security Standard (PCI-DSS) aims to protect the credit card information of individuals by setting strict security requirements for organizations that handle credit card transactions. This includes data encryption and secure storage practices.

    Signup and view all the flashcards

    What is the purpose of FERPA?

    The Family Educational Rights and Privacy Act (FERPA) protects the educational records of students in the United States. This includes grades, attendance records, and disciplinary actions.

    Signup and view all the flashcards

    What is FISMA?

    The Federal Information Security Management Act (FISMA) protects the personal information of individuals that is stored by federal agencies in the United States. This includes sensitive information like social security numbers and passport details.

    Signup and view all the flashcards

    What does nslookup command do?

    The nslookup command is used to query a Domain Name System (DNS) server. It can be used to find the IP address associated with a domain name or to display the DNS server's configuration information.

    Signup and view all the flashcards

    What is a Denial of Service (DoS) attack?

    A Denial of Service (DoS) attack attempts to overwhelm a system or network with excessive traffic, causing it to become unavailable to legitimate users. This can be a website, server, or any other online service.

    Signup and view all the flashcards

    What is multifactor authentication?

    Multifactor authentication (MFA) requires users to provide multiple forms of verification to gain access to a system or application. This might include a password, a one-time code sent to a phone, or a fingerprint scan.

    Signup and view all the flashcards

    Study Notes

    Network Issues and Response

    • A network experiencing slow response times might indicate TCP ports are in a listening state, waiting for connections.
    • Netstat -l command displays TCP ports in a listening state.

    Incident Response Lifecycle

    • Preparation: Mitigate the impact of the incident, report cause and cost, and steps to prevent future incidents.
    • Detection and Analysis: Evaluate incident indicators (legitimate attacks vs. illegitimate), and alert the organization.
    • Containment, Eradication, and Recovery: Establish incident response capability to secure organizational assets.

    Hypervisor Purpose

    • Creates and runs virtual machines.

    Operating System Monitoring

    • Security teams track operating system versions, security updates, and patches on devices, typically through asset management.

    Internal Network Spoofing Prevention

    • DNS records can help prevent internal network spoofing.

    Security and Performance Issues

    • Two private IPv4 addresses that should be blocked on the internet for security and performance reasons are 192.168.18.189 and 203.0.113.168.

    Risk Management

    • Risk reduction: Implementing measures to lessen the negative impacts of risks.
    • Risk avoidance: Choosing not to engage in activities that might involve risks.
    • Risk acceptance: Acknowledging the risks but not taking actions to prevent them.
    • Risk transfer: Passing risk to a third party.

    CIA Triad

    • Confidentiality: Data is accessible only to authorized users.
    • Integrity: Data cannot be altered without authorization.
    • Availability: Data is accessible to authorized users when required.

    Cybersecurity Threats

    • Spear phishing: Targeted phishing attacks attempting to steal sensitive data.
    • Smishing: Phishing attacks via SMS or text messages.
    • Ransomware: Malicious software that encrypts data and demands payment for decryption.
    • Vishing: Phishing attacks using voice calls.

    Network Troubleshooting

    • Implement MAC address filtering to prevent an unknown host from attaching to a network.
    • Block the host's IP address.

    Risk Management Phases

    • Choosing risk strategies: Selecting strategies for dealing with identified risks.
    • Measuring residual risk: Assessing how much risk is left after mitigation actions.
    • Mitigating risks: Taking steps to reduce or eliminate the risks.
    • Determining a risk profile: Understanding and categorizing an organization's risks.

    Attack Types

    • Man-in-the-middle (MitM): An attacker intercepts communication between two parties.
    • Advanced Persistent Threat (APT): A prolonged and sophisticated attack aimed at persistent access and significant damage.
    • Distributed Denial-of-Service (DDoS): Flooding a target with traffic to overwhelm it.
    • Ransomware: Malicious software that encrypts data and demands payment for decryption.

    Security and Accessibility

    • VPN is a security method for accessing a company's secure network remotely.

    Data Protection

    • Hard disk encryption protects data at rest.

    Network Protocols for Secure Transfers

    • SSH can encrypt files transferred over an unsecured network.

    Cybersecurity Tools

    • Nmap, Nessus Scanner, CVSS, Firewall and Patch Management Software.

    Windows Operating System Logs

    • Windows logs track system activity, which can be viewed in Windows Event Viewer (System logs, Application logs, Security logs).

    Threat Intelligence Portals

    • Threat intelligence portals are used to analyze suspicious URLs.

    Authentication Methods

    • Multifactor authentication involves using multiple methods to confirm a user's identity (e.g., password, code sent via phone).

    Control Measures

    • Detective measures: Identify threats and events.
    • Preventive measures: Prevent threats from occurring.
    • Corrective measures: Respond to and resolve detected threats and incidents.

    Disaster Recovery

    • Natural disasters like floods and hazardous material spills can require disaster recovery plans.

    Network Device Troubleshooting

    • To fix wireless printing issues, a new device driver may be required.

    Active Reconnaissance

    • Activity like looking at HTTP source code of a website to gather info.

    Remote Access Procedures

    • Disable telnet to force more secure authentication methods.

    Cybersecurity Tools and Purposes

    • SIEM (Security Information and Event Management) systems can be used to detect anomalies in user activity.
    • Log files contain information about programs running on the device, software installations, hardware/driver operations, and policy successes/failure.
    • Vulnerability databases are helpful but can take time for reporting/investigation before being adopted by security platforms.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz delves into network security concepts, incident response lifecycle, hypervisor functionality, and operating system monitoring. Explore how to effectively address network issues, prepare for incidents, and prevent spoofing while ensuring system security.

    Use Quizgecko on...
    Browser
    Browser