What does the "I" stand for in the CIA Triad?
Integrity
This open-source tool is used to scan for vulnerabilities and identify potential weaknesses in software and systems.
Nessus
What does the letters mean in "UDP"?
User Datagram Protocol
What's the goal of containment?
Limit damage.
What is the extension and magic number of a Windows program file ?
EXE and 0x4D 0x5A
R.A.T Stands for Remote Access Tool? True or False
True
Which tool is most commonly used for capturing and analyzing network traffic?
Wireshark
Switches move packets based on what?
MAC Addresses
The 2nd phase of the Diamond Model, which provides a structured approach to incident response is ...
Detect
Where is malware "likely" to leave files or data on a Windows system?
Temp folders
What type of attack involves tricking specific users into divulging sensitive information?
Spear Phishing
What is the name of a popular Windows memory capture tool?
Winpmem
SEND is a HTTP Request method? True or False
False
This containment technique involves disconnecting a system from the network, blocking IP addresses or ports, and restricting access to prevent further damage.
Network Segmentation
Which Windows service is commonly used by malware to maintain persistence on a compromised system?
Svchost.exe
A type of malware that secretly records and transmits sensitive information, often without the user's knowledge.
A keylogger
What functionality does the "-A" switch provide in Nmap?
Performs OS and version detection
What HTTP response code signifies that a resource has been permanently relocated?
301
The third F on the F3EAD model is ?
Finish
What type of key in the Windows registry is VERY commonly used to allow malware to remain persistent on a system
RUN Keys.
Ex - HKCU\Software\Microsoft\Windows\CurrentVersion\Run
This type of attack tricks victims into revealing sensitive information by posing as a trustworthy source...
Social Engineering
Which tool is "typically" used for analyzing a malware file without executing it?
A disassembler
What is the primary purpose of honeysensors in cybersecurity
Attract, detect and monitor malicious activity.
This step in the incident response process involves documenting what happened, why it happened, and how to prevent similar incidents from occurring in the future.
Lesson Learned
This type of malware uses existing system tools and services to carry out malicious actions, leaving no trace of a traditional executable file behind.
File-less Malware