Cheatsheet (SECURITY) Via-Cheatography Sokoctopus
Cheatsheet (SECURITY) Via-Cheatography Sokoctopus
Acronyms
Acronyms (cont)
PBQs
Know how to configure a RADIUS server, WiFi server, and a client machine with PKI, WPA2 and current best security practices
Be familiar with the linux kernel and how to identify how attacks are taken out on there
what security measures can be taken ons pecific network devices to enhance security
What tech can be applied to different network devices (web server, database, domain controller))
Review attack types and their indicators
General
Port numbers and their protocols, only common ones are mentioned and just review them. It can make some of the other questions easier as
well.
different methods of "preventative" and the like, what physical security measures are the most effective
differences between SOAR and SIEM, Other acronyms to review: CVSS,LDAP, SPI, SoC, API
CASB, other cloud computing concepts (what it takes to move an organization to the cloud, availibility, BCP, edge and fog computing))
review linux kernel for directory traversals, CSFR,
Tip: when taking the exam, flag questions that are worded weirdly and go back to them later and try to rewrite the question yourself. This is what
I had to do for like 8 questions
Best cryptography practices and types to use based on specific scenarios, understand how PKI and PSK works, Tokenization vs hashes
Tip: most "scenarios" seemed to start with "_____ works at _____ organization and is updating/removing/hardening", so familiarize yourself with
business related terms
Review GDPR, ISO, NIST, the diamond intrustion analysis method, and Diffe
Best practices for implementing secure work from home networks and remote desktop accessing
My final score was 759 the second time I took it, 723 the first
DISCLAIMER: This is not a word for word description of the exam and every exam is different
Braindumps.com This website has some "very very similar" questions as to what I had on this exam
Exam Objectives
Wireless Evil Twin Vectors Direct access, wireless, email, supply chain,
Rougue Access Point social media, cloud, removable media
Shadow IT
Attributes of Internal or external threats, level of experienc‐
Actors e/capability, resources, funding, intent
Thirs Party Risks vendor management, supply chain, outsourced Passive/Active drones, war flying/driving, footprinting, OSINT
code, data storage Recon
Impacts of Bad data loss/breaches/exfiltration, identity theft, Exercise Types red, blue, white, or purple team
Security financial, reputation, availability loss Pen Testing un/known environment, partially known enviro‐
Terms w/o Definition nment, lateral movement, privilege escalation,
zero-day, patch management, legacy platforms cleanup, bug bounty, pivoting
1.7 Techniques
EXplain the importance of security concepts in an enterprise enviro‐ Thin client basic app usage, runs on remote server, VDI,
nment local device, minimal operating system on the
Config diagrams, baseline client, big network requirement
Management Containers Standardized, physical infrastructure with one
Data soverignty OS with container software, isolated process,
image, standardized and lightweight, secure
Data Protection DLP, masking, encryption, at rest, in motion, in
processing Monolithic client database code, one big application,
codebase is so large it is hard to do mainti‐
tokenization
nence, not as fast
Geography
Microservices and APIs are the more effecient
SSL transport
version of monolithic
API
Microservice‐ API gateway manages communication through
Site resiliency (hot, warm, cold)) s/APIs gateway to different microservices that leads to
Honeypots/flies/nets a data base, the API is the "glue", scalable,
resilient, security and compliance
DNS Sinkhole
Serverless archit‐ FaaS, applications are remote and autono‐
Fake telemetry
echture mous, removes the OS, it is a stateless
compute container, event triggered (available
2.2 Cloud Concepts
as needed), third party
Acronyms to review: IaaS, PaaS, SaaS, XaaS, CSP, MSP/MSSP,
API, SDN, SDV, VM, SIAM
Fog computing cloud that is close to IoT data, midpoint, distri‐
buted cloud architecture, extends the cloud,
distribute data and processing
no latency, no bandwidth reqs, miminzes
security concerns
Edge computing IoT systems, edge server, close to the use,
process the data on the device, increased
internet speed
Transit Gateway VPC, public cloud that has resources, VPC is SDN central mngmt, vendor neutral, no human
controlled by the transit gateway aka "cloud intervention, Agile, directly programmable
router," connects through VPN to VPCs to secure, use Internal firewall to connect all
Virtualization one physical piece of hardware, runs different servers, use an IPS between internet and
OSs on one deviceVm sprwal avoidance internal net, devices are software based
vm escape protection SDV must see traffic to secure data, monitoring,
Virtualization avoid VM sprawl because noo one knows SIEM, firewalls are able to be implemented
Security where VMs live, detail provisioning so everyone data is encapsulated and encrypted
knows where it is (track), VM is self-contained
Terms w/o Definitions:
VM escape attack type can control host public, community, hybrid, infrastructure as code, on prem v off
HaaS/IaaS outsourcing equipment, must manage internally prem, service integration, multisourcing, control pane (config), data
plane (performing)
SaaS easier and on-demand
PaaS middle ground, no HVAC, no maintenance
2.3 App Dev/Deploy
team, no direct control, building blocks
Must be able to summarize these concepts
Cloud Design elasticity, on-demand, global access,
De/Provisioning
Data Protection resource policies,
QA
SIAM most providers are different, SIAM integrates
diverse providers for a unified view Integrity Measurement
IaaC can be deployed at will, describes app Secure Coding normalization, stored procedures
instances in code, obfuscation/camoflauge
Server v Client Side
OWASP
Compiler v Binary
Elasticity
Scalability
Authentication directory services Non-persistence revert to nkown state, last known good config,
methods high availibility, restoration order
federation Diversity tech, vendors, crypto, controls
attestation Terms w/o Definitions:
TOTP, HOTP, SMS, token key, static codes, generator, dual supply, managed power, PDUs, multipath, NIC,
push notifications/phone calls replication (SAN), disk, copy, NAS, cloud, image, online v offline,
offsite storage
smart cards
Biometrics fingerprint, retina, iris, facial, voice, gait
2.6 Sec Implications
analysis, efficacy rates, fase acceptance/reje‐
ction, CER Acronyms to REVIEW THEIR IMPLICATIONS AND
Remember SCENARIOS SCADA, IoT, VoIP, HVAC, MFP,
MFA Factors: something you know, have, or are
RTOS, SoC, SIM cards
Attributes: somewhere you are, something you
Embedded arduino, raspberry pi, FPGA
can do or exhibit, someone you know
systems
AAA
SCADA/ICS facilities, industrial, manufacturing, energy,
logistics
2.5 Cybersecurity
IoT sensors, smart devices, wearables, facility
Redundancy RAID
automation, weak defaults
Load Balancers on a network
specialized medical
UPS systems
Backup types Full vehicles, aircraft
Incremental Smart Meters
Snapshot Constraints for power, compute, network, crypto, inabilities to
Differential embedded and patch, authentication, range, cost, implied trust
Tape specialized
systems
Imlement secure protocols based on a scenario protocol for ex: LDAP can access
Protocol Definition Use read/writing dir active directory
Cases over an IP
network, uses
DNSSEC Secure DNS, validates info and sign
TCP/IP
integrity through public key crypto‐ DNS
graphy certif‐ LDAPS uses SSL, secure LDAP
icate SASL provides authentication using client certifica‐
SSH Secure shell provides encypted secure tions
client-server terminal, replaced terminal FTPS uses SSL for NOT THE SAME AS
telnet/FTP commun encryption over SFTP
ication FTP client
S/MIME Used with email, Secure/Multi‐ PKI SFTP SSH FTP, SSH used for encryption, can ls dir,
purpose Internet Mail Extensions, manages manipulate files
public/private key pair is required these POP/IMAP Used with email, Use a STARTTLS
keys exntension to encrypt
SRTP Secure Real Time Protocol, keeps ex: POP3 with SSL or use
convos private, adds encyption, HMAC IMAP w/SSL
uses AES, uses Hash based SHA1 NTP no security, classic used in DDoS as
message amplifiers
LDAP Lightweight Directory Access Protocol (X.500 NTPSec secure version of NTP
written by International Telecommunications
SSL/TLS Used with email, always encypted with
Union)
browser emails
3.1 Implement Secure Protocols (cont) 3.1 Implement Secure Protocols (cont)
SSL (Secure Sockets Layer), TLS (Transport DHCP snooping, MAC spoofing,no built in
layer security) is the newer version of SSL) security, rogue DHCP servers are a security
HTTPS private key used on most common issue but can be minimized through trusted
server, symmetric session form uses public interfaces on switches and only allowing distri‐
key transferred using key encryption bution from trusted interfaces
asymmetric encryption prevent DHCP client DoS starvation attacks
symmetric key with a limited number of MAC addys per
gets used during interface
communication Antivirus, auto updates, constant, always check for
IPsec OSI Layer 3, public both tunnel ends Firewalls, encryption/integrity checks to inform firewall
internet, data IS are secure, very animalware configurations
encrypted, anti-replay with standardized Use cases can include, voice and video, time sync, email, file
encryption transfer, directory services, routing and switching, DNR(Domain
AH provides integrity, ESP provides encryption Name Resolution), Net address allocation, and subscriptions
Tunneling
ESP
SNMPv3 SSH encrypts tunnel is asking router‐
communication, follows s/switches for info
CIA from web browser
with HTTPS
DHCP servers must be routing/switching
authorized in AD, no
secure version of DHCP
Implement these based on a scenario Boot Integrity BIOS, will use secure boot, protects UEFI
Secure coding practices: with the BIOS and public key to protect
Bootloader BIOS update with digital signature
Type Scenario Solution
check, verifies boot laoder
Endpoint trojans worms and viruses are Antivirus
device provides central management Attest‐
Protection stopped
server with all bootloader info from ation
stops spyware/ransomware/fileless Antima‐
chain of trust. The report will compare
lware
with trusted v not trusted
allows to detect a threat without or EDR
Various Boot not wanting to lose contact with a Secure
with signatures and can use
Levels (Chain system, perfect to get in, rootkits Boot
behavioral analysis, can investigate
of Trust) work, UEFI
and respond
bootloader verifies signature of OS Trusted
OSI app layer, can block/allow, NGFW
kernel Boot
examine encrypted data
allows us to measure if any changes Measured
HIDS uses log files to detect, HIPS HIPs/HIDS
occured, measurements stored in Boot
can block known attacks and uses
TPM as a hash from previous two
signatures, hashes, and behavioral
processes
analysis
Database breaches can be expensive, compliance issues,
allow/block incoming or outgoing app Host-
continuity of business is important
traffic based
firewall
replacing sensitive data like a SSN with Tokeni‐ app code is signed by developer, code
a different, totally random number. ex: zation assymetric encryption, trusted CA signing
tap to pay, NOT HASHING OR signs developers public key
ENCRYPTING SAST for static code analysis, can Static v
adding random data to a hash to secure Salting easily find vulnerabilities(can have Dynamic
it further false positives). Code
one way, ex: passwords, fixed length Hashing Analysis
Application occurs when info is going in, normal‐ input dynamic analysis, random data put Fuzzing
Security ization valida‐ into an app, time and CPU resource
tions heavy, try CERTBFF, negative
testing, attack type,
info stored on computer from browsers, cookies
tracks temp info, personalization, Hardening minimizing attack survace, removing all possible
session mangmt, sensitive info is NOT entry points, can be based on compliance, CIS,
supposed to store info SANS, NIST
secure headers are added to web Headers possible entry points, close all except Open
server configuration, restricts browsers, required ports, used with NGFW, use Ports
helps prevent XSS attacks nmap
FDE, ex: Bitlocker, Disk
encryption
Implement secure network designs based on scenarios Remember to review how to install and configure wireless security
settings
Design Type Terms Definition Scenarios
Cryptographic WPA2
Load Balancing active/active
Protocols
passive/active
WPA3
Virtual IP
CCMP
Segmentation VLAN
SAE
DMZ
Authentication EAP
Extra or Intranet
Tools
VPN split tunnel v full tunnel
PEAP
SSL/TLS
EAP-FAST
HTML5
EAP-TLS
L2TP
EAP-TTLS
DNS
IEEE 802.1x
Port Security snooping
RADIUS
Network jump servers
Methods PSK, open, WPS, captive portals
Appliances
Installations site surveys, heat maps, WiFi analyzers,
forward proxy
channel overlaps, WAP, ap security
reverse proxy
rooting
3.7 Account Management
sideloading
Identity Tools IdP, Attributes, Certificates, Tokens, SSH
custom firmware
Keys, Smart Cards
OTA
Account Types user, shared, generic, guest, service
geotagging
Account Policies Password complexity, history, and reuse
Hotspot prohibiting
Deployment BYOD, CYOD, COPE, VDI Network location, geofencing, geotagging
Models
access policies, time based logins, account
Terms w/o Definitions: audits, permissions, lockout, disablement
context-aware authentication, carrier unlocking, UEM, MAM,
Android, Camera use, SMS, external media, USB OTG, microphone,
GPS
Authentication keys, vaults Comptia Objectives List Sec+ 691 Exam Cram (Book, $40)
management (Free)
TPM, HSM, knowledge-based Professor Messer(Free, 601 Get Certified Get Ahead (Book,
Authentication/‐ EAP, SHAP, PAP, RADIUS, 802.1x, SSO, Videos) $40)
Authorization SAML, TACACS+ LinkedIn Learning (1st Official Comptia Study Tools (Books,
Kerberos Month Free) $50 USD)
Access Control ABAC, MAC, DAC Anki Learning Flashcards Practice Tests!
Schemes (Free)
3.9 PKI
head used for file manipu‐ Tcpreplay Terms w/o Definitions:tabletop, walkthroughs, simulations, diamond
lation (FM) model of intrusion analysis, irp
tail FM
4.3 Data Support
cat FM
Utilize appropriate data sources to support an investigation
grep FM
SIEM Dashboards sensors, sensitivity, trends, alerts, correlation
chmod FM
Log Files Network, system, app, security, web, DNS,
logger FM
authentication, dump files, VoIP, SIP
Terms w/o Definitions:Data sanitization, dd, password crackers, syslog
indicent response, OpenSSL
journalctl
NXLog
Bandwidth monitors
Metadata email, mobile, web, file
netflow
Protocol Analyzer
4.4 Mitigation
Reconfiguring Endpoints
Quarantine
Configuration alter firewall, MDM, DLP, content filter, cert
changes updates
Isolation, Containment, Segmentation
SOAR playbooks
Control preventive, detective, corrective, deterrent, compen‐ Third Party Risk vendors, supply chain, business partners, SLA,
Types sating, physical Management MOU, MSA, BPA, EOL, EOSL
Categories manegerial, operational, technical Data Classification
Governance
5.2 Regulations
Retention
Importance of applicaible regulations, standards, or frameworks that
Credential personnel, third party, devices, service
impact organizational security posture
Policies in accounts, admins
Legislation GDPR reference to...
National/territory/state laws Organizational Change management and control
PCI DSS Policies
Frameworks CIS
5.4 Risk Management
NIST
Acronyms: RTO, RPO, MTTR, MTBF, DRP, SLE, ALE, IP, ARO
RMF/CSF
Risk types external, internal, legacy systems, multiparty, IP
ISO
include... theft, and software compliance
Cloud
Risk Management Acceptance, Avoidance, Transference,
SSAE
Stategies Mitigation
Guides OS
Risk Analysis Control assesments
Web server
inherent risk
residual risk
5.3 Policies
control risk
Personnel Abide by AUP, job rotations, mandatory
Qualitative v Quantitative risk
vacations, sepereation of duties
Likelihood of occurence
least privilege
Asset Values
clean desk, background checks, NDAs, social
media analysis, Onboarding, Offboarding, User SLE, ALE, ARO
Training/Role based training Business Impact RTO, RPO, MTTR, MTBF, DRp
Diverse Training Analysis
site risk assessment
Consequences to reputation is damaged, identity theft, fines, IP Use layered security : A layered security approach involves implem‐
an org when data theft enting multiple layers of defense to protect the network from different
breaches occur types of threats. This includes using firewalls, intrusion detection and
Notifications prevention systems, antivirus software, encryption, and access
controls.
Data Types Public
Secure network infrastructure: The network infrastructure should be
Private
secured by implementing strong passwords, disabling unnecessary
Sensitive services, updating firmware and software, and restricting access to
Confidential critical network devices. Network devices should also be physically
secured to prevent unauthorized access.
Proprietary
Implement access controls: Access controls should be implemented
PII
to restrict access to sensitive information and resources. This
Health, Govt, Customer includes user authentication, authorization, and accounting (AAA),
Financial role-based access control, and network segmentation.
Privacy Enhancing Data minimization Encrypt sensitive data: Sensitive data should be encrypted both in
Technologies transit and at rest. This includes using secure protocols such as
HTTPS, SSH, and VPNs for data transmission and encryption tools
Data masking
such as BitLocker, VeraCrypt, or LUKS for data storage.
tokenization
Train employees: Security awareness training should be provided to
anonyminity all employees to educate them on security best practices and to
Roles and their Data owners reduce the risk of human error.
Responsibilities Monitor and test the network: Regular monitoring and testing should
be conducted to identify and remediate security vulnerabilities. This
Data controller
includes using network monitoring tools, conducting penetration
DPO
testing, and reviewing audit logs.
Info Life Cycle
Terms of Privacy Notices Encryption and Keys
Agreement
Public vs Private Key
Network Design
Public Key: A public key is a part of the asymmetric encryption Firewalls allow web traffic, disallow all traffic from specific IP,
algorithm and is made available to anyone who wants to commun‐ and ensure implicit deny, port 53 is DNS,
icate with the owner of the key. It is used to encrypt data, digital Proxy
signature verification, and establish secure communication channels. PBQ
The public key can be freely distributed as it does not contain IDS alert, supposed to be denied on ACL, given diagram.
sensitive information. Private Key: A private key, on the other hand, 443 default port for https, NAT, NAPT firewall in use
is the other half of the asymmetric encryption algorithm and is kept
3.3 PBQ tcp port 22, new inbound rule wizards, use custom, rule
secret by the owner of the key. It is used to decrypt data, generate
can be named SFTP, most groups use third party for
digital signatures, and establish secure communication channels.
FTP,
The private key must be kept secure as it contains sensitive inform‐
PBQ multifactor auth characteristis, payload, trojan with
ation that must not be disclosed to anyone else.
Vincent keylogger
Asymmetric Keys vs Symmetric Keys
Humble
Symmetric Key: A symmetric key encryption system uses the same
cryptographic scenario: RSA,
secret key to both encrypt and decrypt the data. The sender and
hash private key encryption to create dig sig
receiver must have the same secret key to communicate securely.
alice then attatches DS to og message to deliver to bob
The symmetric key encryption system is faster than the asymmetric
(SHE FORGOT TO ENCRYPT THIS) bob then
key encryption system, and it is typically used for bulk data encryp‐
decrypts og message w/ DS using Alice's public key
tion. Asymmetric Key: An asymmetric key encryption system uses
resulting in the has of the og message bob performs
two keys, a public key, and a private key. The public key is used to
hash comparison the hashes do not match no trust
encrypt the data, and the private key is used to decrypt it. Anyone
can have access to the public key, but the private key is kept secret Other 601-P1: blowfish cipher, Bcrypt? can lengthen and
by the owner. Asymmetric key encryption is slower than symmetric Vincent strengthen keys, longer the key, the longer a file is
key encryption but provides better security and is typically used for Humble confidential,
digital signatures, secure key exchange, and establishing secure Videos
communication channels. The main difference between symmetric
and asymmetric key encryption is that symmetric key encryption uses
the same key to encrypt and decrypt data, while asymmetric key
encryption uses two different keys for encryption and decryption. The
symmetric key encryption system is faster, while the asymmetric key
encryption system is more secure.
DiD
Cloud vs On Premises
DNS Tunneling
Virtualization vs Containerization
"As a Service"
Alt text: Cloud services and how they differ from one another