GCED-1 Flashcards

(25 cards)

1
Q

Which Snort rule behavior is triggered by: alert tcp $HOME_NET 21 -> $EXTERNAL_NET any (msg:”Potential FTP Brute Force”; flow:from_server,established; content:”530”; threshold:type both, track by_dst, count 5, seconds 60;)?

A

Alerts once every 60 seconds if at least 5 ‘Login incorrect’ (530) responses are sent to an external destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Wireshark filter isolates DNS traffic specifically for the host 192.168.0.35?

A

dns && ip.addr == 192.168.0.35

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a stateful packet filter handle a packet that does not match an existing state table entry or a new ‘established’ connection?

A

It drops the packet as it is considered out-of-state or unsolicited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a discrepancy between $MFT Standard_Information ($SI) and File_Name ($FN) timestamps most likely indicate?

A

Anti-forensic ‘timestomping’ (manual modification of timestamps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

High entropy and a lack of recognizable strings/imports in an executable are signs of what evasion technique?

A

Obfuscation via a runtime packer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a primary security flaw of the TFTP protocol?

A

It lacks built-in authentication or encryption mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the most critical action to ensure disk image integrity during a forensic chain of custody?

A

Generating and verifying a cryptographic hash (e.g., SHA-256) of the image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term describes using a compromised web server in the DMZ to attack internal database servers?

A

Pivoting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a standard stateful firewall handle a TCP packet with the ACK flag set but no corresponding state table entry?

A

It drops the packet because it is unsolicited and out-of-state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Cisco IOS feature prevents IP spoofing by filtering traffic based on the IP assigned via DHCP?

A

IP Source Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary goal of the ‘Containment’ phase in incident response?

A

Limiting the scope and impact of the incident to prevent further damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the characteristics of ‘packed’ malware?

A

High entropy and a lack of a visible import table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Wireshark filter isolates traffic for 10.0.0.5 that is NOT using DNS?

A

ip.addr == 10.0.0.5 && !dns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why should IR teams analyze the ‘Drafts’ folder of a compromised email account?

A

To identify emails intended for exfiltration or covert communication that were not yet sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which AWS service monitors performance patterns to alert on unusual activity?

A

AWS CloudWatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you confirm a Blind SQL Injection vulnerability?

A

Inject a payload that triggers a time delay (e.g., WAITFOR DELAY) and measure response time.

17
Q

Which Windows Event ID is critical for detecting lateral movement via Pass-the-Hash (NTLM)?

A

Event ID 4624 (Logon Type 3)

18
Q

What is the primary function of a Cloud Access Security Broker (CASB)?

A

Providing visibility and policy enforcement for data in third-party SaaS apps.

19
Q

What is the main advantage of NetFlow over full packet capture (PCAP)?

A

Lower storage requirements for long-term historical analysis of ‘who talked to whom’.

20
Q

What is ‘Process Hollowing’?

A

A technique where malware replaces the memory of a legitimate suspended process with malicious code.

21
Q

What is a ‘Honeytoken’ in Active Defense?

A

A piece of data (like a fake credential) that triggers an alert when accessed or used.

22
Q

An ICMP Type 8 (Echo Request) sent to a broadcast address with a spoofed source is what attack?

23
Q

Which AWS log source records all API calls made within an account?

A

AWS CloudTrail

24
Q

What is a key benefit of ‘Outbound Filtering’ (Egress Filtering)?

A

It can prevent compromised systems from communicating with external C2 servers.

25
According to the Order of Volatility, what should be collected first from a running computer?
Contents of System Memory (RAM)