click below
click below
Normal Size Small Size show me how
CySA+ Weak Areas
Weak Areas to fine tune before the test
| Question | Answer |
|---|---|
| The four different phases of incident response are | Preparation, Detection and analysis, containment eradication and recovery, post incident activity |
| Makes the system resilient to attacks by hardening systems, writing policies and procedures, and setting up confidential lines of communication | Preparation |
| Testing and exercises, preparing kits and training staff are examples of the _____phase | Preparation |
| Determines if an incident has taken place, triage it, and notify the relevant stakeholders | Detection and analysis |
| Limits the scope and magnitude of the incident by securing data and limiting impact to business operations and your customers | Containment |
| The cyber kill chain consists of | 1. Reconnaissance 2. Weaponization 3. Delivery 4. Exploitation 5. Installation 6. Command and Control 7. Actions and objectives |
| Review examples of the phases of the cyber kill chain. | Review examples of the phases of the cyber kill chain. |
| This is a process that destroys data by using a powerful magnet to disrupt a device’s magnetic field, rendering data unreachable. The problem is that you have no way of knowing if data has actually been destroyed because the device becomes inoperable | Degaussing |
| www.dion.com/.../.../.../ is an example of a | directory transversal attack |
| To protect yourself from cross-site scripting (XSS) you should conduct | input validation |
| _______is an exploit where the attacker attaches code onto a legitimate website that will execute when the victim loads the website. | Cross-site scripting (XSS) |
| is when an attacker takes control of someone’s online activity by stealing or guessing the information that lets the website know the person is still logged in. | Session hijacking |
| works by exploiting the trust that a web application has in a user's browser. Attackers craft a malicious URL or script designed to perform an unwanted action on behalf of the victim. | Cross-Site Request Forgery (CSRF) |
| Concept of order of votality is ... | how long is the data going to stick around before it is not available anymore. |
| Most volatile data = | data that has the potential to disappear the most. |
| Order of volatility from most volatile to least volatile numbered ... | 1. CPU registries, CPU cache 2. Router table, ARP cache, kernel stats, memory 3. temporary file systems 4. Disk 5.Remote logging data 6. Physical config. data, network topology 7.Archival media |
| is a way for a domain to list all the servers they send emails from. | Sender Policy Framework (SPF) |
| enables domain owners to automatically "sign" emails from their domain, just as the signature on a check helps confirm who wrote the check. | DomainKeys Identified Mail (DKIM) |
| tells a receiving email server what to do given the results after checking SPF and DKIM. A domain's DMARC policy can be set in a variety of ways — it can instruct mail servers to quarantine emails that fail SPF or DKIM (or both), to reject such emails,. | Domain-based Message Authentication Reporting and Conformance (DMARC) |
| Port 21 & 20 | FTP, File Transfer Protocol command control |
| Port 22 | SSH/SCP/SFTP, Secure Shell, secure logins, file transfers (scp, sftp), and port forwarding |
| Port 23 | Telnet, Telnet protocol, for unencrypted text communications |
| Port 25 | SMTP, Simple Mail Transfer Protocol, used for email routing between mail servers |
| Port 53 | DNS, Domain Name System name resolver |
| Port 80 | HTTP, Hypertext Transfer Protocol (HTTP) uses TCP in versions 1.x and 2. HTTP/3 uses QUIC, a transport protocol on top of UDP |
| Port 110 | POP3, Post Office Protocol, version 3 (POP3) |
| Port 123 | NTP, Network Time Protocol |
| Port 143 | IMAP, Internet Message Access Protocol (IMAP), management of electronic mail messages on a server |
| Port 443 | HTTPS (HTTP over SSL), Hypertext Transfer Protocol Secure (HTTPS) uses TCP in versions 1.x and 2. HTTP/3 uses QUIC, a transport protocol on top of UDP. |
| This tool is designed to identify files in a partition or volume that is missing it's index or file allocation table. | File carving tool |
| If a system is infected with a memory resident malware package what is the best means of finding the malware? | search the core dump or hibernation file |
| The <SCRIPT> tag is used to mark the beginning of a code and its use is indicative of a _________ | cross site scripting attack |
| PCI DSS requirements for vulnerability scan frequency is... | on at least a quarterly basis. |
| Community-driven database that keeps track of IP addresses reported for abusive behavior | AbuseIPDB |
| is a command-line utility that you can use to capture and inspect network traffic going to and from your system. | Tcpdump |
| is a vulnerability that can be used to manipulate the application to redirect users to a different URL other than the one that's intended. T | Open redirect |
| is a nonprofit organization that works with a global community to develop best practices for cybersecurity. | The Center for Internet Security |
| True or False? Network segmentation involves dividing a network into subnets to control access and traffic flow. Network isolation is more severe, creating a standalone network with no connectivity to other parts of the network. | True |
| ________also known as a man-in-the-middle (MitM) attack, is a cyberattack where an attacker intercepts or alters communication between two parties. | on-path attack |
| True or False? Write Zero, also known as Single Overwrite, zero fill erase or zero-fill, is one of the most popular methods. The Write Zero data sanitization method replaces your regular, readable data with zeros, | True |
| _____________a firmware-based command that overwrites a drive's media with zeros or ones to permanently erase all user data: It completely destroys all user data and the management table, making it unrecoverable. | ATC secure erase |
| {"Geeks":[ { "firstName":"Vivek", "lastName":"Kothari" }, { "firstName":"Suraj", "lastName":"Kumar" }, { "firstName":"John", "lastName":"Smith" }, { "firstName":"Peter", "lastName":"Gregory" } ]} | JSON |
| <Geeks> <Geek> <firstName>Vivek</firstName> <lastName>Kothari</lastName> </Geek> <Geek> <firstName>Suraj</firstName> <lastName>Kumar</lastName> </Geek> <Geek> <firstName>John</firstName> <lastNam | XML |
| <!DOCTYPE html> <html> <head> <title>GeeksforGeeks</title> </head> <body> <h1 style="color: green;"> GeeksforGeeks </h1> <p> A Computer Science portal for geeks </p> </body> </html> | HTML |
| sequence in cybersecurity typically involves: identifying problems, gathering data including logs and timelines, analyzing the data, pinpointing the root cause through techniques & finally, developing remediation and prevention strategies | Root cause analysis |
| Port 3306 | MySQL |
| Port 1521 | Oracle |
| Port 5432 | Postgres |
| Port 1433/1434 | Microsoft SQL |
| Assessing application security by supplying it with invalid inputs. | Fuzzing |
| CVSS base metrics consist of AV, AC, PR, UI, S, C, I, A which are | Attack vector, attack complexity, privileges required, user interaction, scope, confidentiality, integrity, and availability |
| Access Vector (AV) | AV can be P(physical), L(local), A(adjacent) or N(network) |
| User Interaction (UI) | N(None), R (Required) |
| Scope(S) can be U or S... | Changed or Unchanged |
| Unchanged(U).... | affects only the local security context |
| Changed(C) | affects the entire security context |
| This is another term for virtual machine | hypervisor |
| HTTP Status codes 100-199 | Informational Responses |
| HTTP Status codes 200-209 | Successful Responses |
| HTTP Status codes 300-399 | Redirects |
| HTTP Status codes 400-499 | Client Errors |
| HTTP Status codes 500-599 | Server Errors |
| In Linux systems, /var/log | is a directory that contains log files from the system and various programs/services. |
| SCADA (Supervisory Control and Data Acquistion) | is a form of industrial control system (ICS) that is used to maintain sensors and control systems over a large geographic area. |
| DNS Sinkholes | redirects Internet traffic to change the flow to malicious URLs, and prevents devices from connecting to these dodgy domains. With a DNS sinkhole, organizations can restrict access to malicious websites (where bad URLs go to die) |