Professional Documents
Culture Documents
Chapter 3
The following are some of the most common evasion techniques against traditional IDS and
IPS devices:
■ ______________: When the attacker evades the IPS box by sending fragmented packets.
■ Using low-bandwidth attacks: ______________
■ ______________: Using spoofed IP addresses or sources, as well as using intermediary
systems such as proxies to evade inspection.
■ Pattern change evasion: ______________
■ Encryption: ______________
Chapter 5
The following are the most common incident response team structures:
■ _______________________________
■ _______________________________
■ _______________________________
The following are the most common incident response team staffing models:
■ _______________________________
■ _______________________________
■ _______________________________
The VERIS schema is divided into the following five main sections:
■ ________________________________
■ _______________________________
■ _______________________________
■ _______________________________
■ _______________________________
Appendix B: Memory Tables and Lists 5
Chapter 7
Table 7-4 PCI Data Security Standard—High-Level Overview
Goals PCI DSS Requirements
Build and maintain a secure network and
systems
2. Do not use vendor-supplied defaults for
system passwords and other security
parameters.
3. Protect stored cardholder data.
Chapter 9
While studying for the CCNA Cyber Ops SECFND exam, you learned about the concept of
the 5-tuple. As a refresher, the 5-tuple refers to the following five elements:
■ _________________________
■ Source port
■ _________________________
■ Destination port B
■ _________________________