Comptia 01 Sec+ Study Guide
Comptia 01 Sec+ Study Guide
1.1 GIVEN A SCENARIO, ANALYZE INDICATORS OF COMPROMISE AND DETERMINE THE TYPE OF MALWARE.
A) Viruses: An unsolicited and unwanted malicious program.
B) Crypto-malware: A malicious program that encrypts programs and files on the computer in order to extort
money from the user.
C) Ransomware: Denies access to a computer system or data until a ransom is paid. Can be spread through a
phishing email or unknowingly infected website.
D) Worm: A self-contained infection that can spread itself through networks, emails, and messages.
E) Trojan: A form of malware that pretends to be a harmless application.
F) Rootkit: A backdoor program that allows full remote access to a system.
G) Keylogger: A malicious program that saves all of the keystrokes of the infected machine.
H) Adware: A program that produces ads and pop ups using your browser, may replace the original browser
and produce fake ads to remove the adware in order to download more malware.
I) Spyware: Software that installs itself to spy on the infected machine, sends the stolen information over
the internet back to the host machine.
J) Bots: AI that when inside an infected machine performs specific actions as a part of a larger entity known
as a botnet.
K) RAT (Remote Access Trojan): A remotely operated Trojan.
L) Logic bomb: A malicious program that lies dormant until a specific date or event occurs.
M) Backdoor: Allows for full access to a system remotely.
2.2 GIVEN A SCENARIO, USE APPROPRIATE SOFTWARE TOOLS TO ASSESS THE SECURITY POSTURE OF AN ORGANIZATION.
A) Protocol analyzer: Hardware or software that captures packets to decode and analyze their contents.
Allows for you to easily view traffic patterns, identify unknown traffic, and verify packet filtering and
security controls.
a. Big data analytics: Allows for the user to store large amounts of data and then easily go through
it.
B) Network scanners: A computer program used for scanning
networks to obtain user names, host names, groups, shares, and services.
a. Rogue system detection: Find devices that are not supposed to be on the network, such as rogue
AP’s.
b. Network mapping: Identifying all devices on a network along with a list of ports on those
devices.
C) Wireless scanners/cracker:
a. Wireless scanners: Is for wireless monitoring, it scans wireless frequency bands in order to help
discover rogue APs and crack passwords used by wireless APs.
b. Wireless cracker: Uses wireless attacks to test if an attacker could find the passwords to gain
access to parts of your network.
i. • WEP - Cryptographic vulnerabilities, is relatively straightforward.
ii. • WPA1 PSK and WPA2 PSK, uses dictionary brute force and rainbow tables attacks.
D) Password cracker: A program that uses the file of hashed passwords, such as a rainbow table, and then
attempts to break the hashed passwords of the network. Getting the hashes is the hardest part.
E) Vulnerability scanner: Attempts to identify vulnerabilities, misconfigured systems, and the lack of security
controls such as up-to-date patches. They can be passive or active, either way they have little impact on a
system during the test.
F) Configuration compliance scanner: A vulnerability scanner that verifies systems are configured correctly
and meet the minimum-security configurations, it typically does this by comparing the system to a file
that has the proper configurations. This is an ongoing task and can be integrated with the logon process.
G) Exploitation frameworks: An already created set of exploits that already have all the major components
designed, the user just needs to figure out how to inject them into the network. These toolsets can be
used offensively by hackers or defensively by pen testers.
H) Data sanitization tools: Tools that overwrite data on hard drives so that it is unrecoverable, this only
needs to be done once but some may do it multiple times to feel safe.
I) Steganography tools: Allows for the user to embed data into an image, video, sound files, or packets. It is
security through obscurity.
J) Honeypot: Decoy systems or networks to gather information on the attacker.
K) Backup utilities: Important to protect data from being lost, downtime, or corrupted.
L) Banner grabbing: The process of capturing the initial message (the banner) from a network service. Often
the banner discloses the application's identity, version information, and other sensitive information.
M) Passive vs. active:
a. Passive: You are observing.
b. Active: You are interacting with the network by sending traffic and trying to access parts of the
network.
N) Command line tools:
a. ping: The name is based on the sound made by sonar. Tests reachability, it is a primary
troubleshooting tool.
b. netstat (Network statistics):
i. netstat -a: Show all active connections.
ii. netstat -b: Show binaries, for Windows.
iii. netstat -n: Does not resolve names.
c. tracert (Windows)/traceroute (MacOS/Linux): Uses the ICMP (Internet Control Message Protocol)
time to live (TTL) error message to map the path of a packet. Time in TTL is measured in hops,
TTL = 1 for the first router, and 2 refers to the second router.
d. nslookup/dig (Domain Information Groper):
i. nslookup: Used to gather information from DNS servers, lookups names and IP
addresses. Was replaced by dig.
ii. dig (Domain Information Groper): More advanced than nslookup and shows more
detailed domain information. Is for Linux but can be downloaded for windows.
e. arp (Address Resolution Protocol): Used to view MAC addresses.
i. Arp -a: Views the local arp table.
f. ipconfig/ip/ifconfig:
i. ipconfig: Shows the Windows TCP/IP configuration.
ii. ip: Used to replace ifconfig on Linux. Shows and manipulates settings on the network
interface card (NIC).
iii. ifconfig: Shows the Linux interface configuration.
g. tcpdump: A command-line packet analyzer that allows to capture packets from the command
line.
h. nmap: It is designed to scan a network and create a map, this is useful as a vulnerability scanner
because it can find open ports and unsecured access points.
i. netcat: Is used to safely connect to remote systems using command line instead of a front-end
application. Can also be used for banner grabbing.
2.4 GIVEN A SCENARIO, ANALYZE AND INTERPRET OUTPUT FROM SECURITY TECHNOLOGIES.
A) HIDS/HIPS:
a. HIDS (Host-based intrusion detection system): Runs on a single computer and alerts of potential
threats to help warn of attacks against that host.
b. HIPS (Host-based intrusion prevention system: Runs on a single computer and intercepts
potential threats to help prevent attacks against that host.
B) Antivirus: Software that is specifically designed to detect viruses and protect a computer and files from
harm.
C) File integrity check: An application that can verify that the files have not been modified using hash
algorithms to authenticate the file.
D) Host-based firewall: A firewall that is on a single host that only restricts incoming and outgoing network
activity for that host.
E) Application whitelisting: The practice of allowing only approved programs to run on a computer,
computer network, or mobile device.
F) Removable media control: Blocks users from using USB drives, CD/DVD drives or portable hard
drives/flash drives to help prevent the installation of viruses, malware, and exfiltration of data.
G) Advanced malware tools: Block malware from running by blocking file signature, heuristics/Anomalous
behavior, sandboxing, virtualizing. Need to be routinely updated with the latest definitions to be secure
and protect against current threats.
H) Patch management tools: Tools that aid in the: monitoring, evaluating, testing, and installing of the most
current software patches and updates.
I) UTM (Unified Threat Management): A group of security controls combined in a single solution that can
inspect data streams for malicious content and block it.
J) DLP (Data Loss Prevention): Systems that identify, monitor, and protect data: from unauthorized use,
transfers, modification, or destruction.
K) Data execution prevention (DEP): Memory regions are marked as non-executable which prevents code
from being executed. This protects against memory abuse attacks such as buffer overflows.
L) Web application firewall: A firewall that looks monitors and filters packets carrying HTTP traffic using a set
of communication rules.
3.1 EXPLAIN USE CASES AND PURPOSE FOR FRAMEWORKS, BEST PRACTICES AND SECURE CONFIGURATION GUIDES.
A) Industry-standard frameworks and reference architectures:
a. Framework: Is a collection of standardized policies, procedures and guides, meant to direct a:
user, firm, or any organization.
b. Regulatory: Is a framework that is based on mandated laws and regulations. HIPAA is an example
of this.
c. Non-regulatory: The common standards and best practices that the organization follows.
d. National vs. international:
i. National: Framework based on the laws of a single country.
ii. International: Framework based on the laws of multiple countries.
e. Industry-specific frameworks: Frameworks based on the standards and regulations of a certain
industry.
B) Benchmarks/secure configuration guides: Instructions that have been developed over years that are
designed to give organizations the best and most secure configurations for a particular system.
a. Platform/vendor-specific guides: Hardening guides that are specific to the software or platform,
also you can get feedback from the manufacturer or internet interest groups. System default
configurations are unsecured and at high risk for exploits.
b. Web server: Web application firewall (WAF), DMZ, Reverse Proxy for incoming communication
from the internet to the server.
c. Operating system: Implement a change management policy.
d. Application server: Securing an application server means using industry standard guides, vendor
specific, locking down the server to only the ports it needs for its specific role.
e. Network infrastructure devices: Use national vs international guides, regulatory/non-regulatory
and general purpose guides for securing.
f. General purpose guides: Security configuration guides that are generic in scope.
C) Defense-in-depth/layered security:
a. Vendor diversity: The practice of implementing security controls from different vendors to
increase security. Reduces the impact of company specific vulnerabilities.
b. Control diversity: The use of technical controls, administrative controls, and physical controls to
harden security.
c. Administrative: Mandated standards set by organizational policies or other guidelines.
d. Technical: Technologies that reduce vulnerabilities, examples of this are: encryption, antivirus
software, IDSs/IPS, and firewalls.
e. User training: Providing regular training to users on common threats, emerging threats, and
social engineering in to raise awareness and help avoid attacks.
4.2 GIVEN A SCENARIO, INSTALL AND CONFIGURE IDENTITY AND ACCESS SERVICES.
A) LDAP(Lightweight Directory Access Protocol):
Queries information about the directory. Is a hierarchical structure; CN = Common Name, OU = Organizational
Unit, DC = Domain Controller. Utilizes TCP/IP, TCP/UDP ports 389.
a. Secure LDAP: LDAP over SSL/TLS, uses TCP on port 636. Does not send queries in plain text.
B) Kerberos: Developed by MIT, for mutual authorization between client and server. It uses a ticket granting
system for authorization. Is a government standard.
C) TACACS+ (Terminal Access Controller Access Control System): Runs TCP over port 49, encrypts all parts of
communication. Does not suffer due to security issues caused by RADIUS. Authorization and
Authentication are separated for granular control.
D) CHAP (Challenge Handshake Authentication Protocol): Authenticates PPP clients to the server. Uses a
one-way hash based on a shared secret that is compa
nd server end. Does not send
plaintext over the wire.
E) PAP (Password Authentication Protocol): Username and password are sent as plaintext and are no longer
used.
F) MS-CHAP (Microsoft CHAP): Delivers a two-way, mutual authenticationbetween the server and client.
Separate keys are created for sent and received data. Is seen as weak due to it using a 5-bit encryption
system, same as NTLM.
G) RADIUS (Remote Authentication and Dial-in User service): Combines authentication and authorization,
only encrypts the passwords, each network device must contain an authorization configuration. There is
no command logging, and minimal vendor support. Uses ports 1812 for authentication and authorization
and port 1813 for accounting functions.
H) SAML (Security Association Markup Language): Authenticates through a third-party source to gain access,
the resource is not responsible for the authentication. The request is passed through a trusted third-party
server.
a. The three roles are: Principle (the user or client), identity provider (the one who assures the
identity of the principle), and service provider (a web service of some type.)
I) OpenID Connect: OpenID Connect handles the authentication part of the identification process and uses
OAuth for authorization.
J) OAUTH (Open Standard for Authorization): Token authorization happens in the background. Uses a logon
from a larger trusted service.
K) Shibboleth:An open-source software that uses SAML to provide a third-party federated SSO
authentication.
L) Secure token: An authentication mechanism that can be used to identify and authenticate, and to deny
and allow access.
M) NTLM (New Technology LAN Manager): Used for authenticating in a Windows domain, was replaced by
Kerberos for the most part.
a. NTMLv2: Is the most common form used, is somewhat insecure.