News:

SMF - Just Installed!

Recent posts

#21
Certifications / Cyber Risk Management for Tech...
Last post by Richard - Nov 13, 2023, 11:29 AM
>> Cyber Risk Management for Technicians <<

Which NIST special publication is a guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach?
A NIST SP 800 39
B NIST SP 800 53A
C NIST SP 800 53
D. NIST SP 800 37

Which of the following is a part of the Examine Method?
A List processes that should be running
B Making the information available to all information system users
C. Inspecting the physical security measures
D Testing access control

If the cost of controls exceeds the benefit the organization may choose to accept the risk instead.
A. True
B False

Which OCTAVE process involves collecting information about important assets and security requirements and threats and current organizational strengths and vulnerabilities from managers of selected operational areas?
A. Identify Operational Area Knowledge
B Create Threat Profiles
C Identify Senior Management Knowledge
D Identify Staff Knowledge

Open Source Security (OSSEC) is what?
A. A host based security system that monitors for changes
B A network based security system that sends alert messages
C An email based security system that scans emails for vulnerabilities.
D None of the above

Which of the following describes NetScan Tools Pro?
A A network debugging and exploration tool
B A powerful command line packet analyzer
C A tool that provides advanced network trace routing
D. A collection of Internet information gathering and network troubleshooting utilities

In NIST SP 800 53 the security control structure consists of all the following components except for:
A Priority and baseline allocation
B Supplemental guidance
C Control enhancements
D. All of these are in the security control structure

In order to automate host characteristic monitoring you can compare baselines and snapshots with syslog.
A True
B. False

Which of the following is a step in detecting and analysing host changes?
A Create a current snapshot of your host
B Create a baseline of your host
C Compare your snapshot to your baseline
D. All of the above

Which tier of Risk Management is associated with Enterprise Architecture?
A Tier 1 Organization (Governance)
B. Tier 2 Mission (Business Process)
C Tier 3 Information System (Environment of Operations)
D. None of the above

Kismet is different from a normal network sniffer such as Wireshark or tcpdump because it separates and identifies different wireless networks in the area.
A. True
B False

What type of analysis involves using scales to suit circumstances and allows for quick identification of potential risks as well as vulnerable assets and resources?
A Quantitative Analysis
B Audit Analysis
C. Qualitative Analysis
D Cost/benefit analysis

NIST SP 800 30 defines risk as a function of the likelihood of a given threat source exercising a particular potential vulnerability and the resulting impact of that adverse event on the organization.
A. True
B False

Which step of a risk assessment uses the history of system attacks?
A. Step 2: Threat Identification
B Step 3: Vulnerability Identification
C Step 4: Control Analysis
D Step 5: Likelihood Determination

One strategy for determining the proper level of acceptable risk is to:
A Eliminate the asset exposure to risk or eliminate the asset altogether
B There is no level of acceptable risk
C. Determine a point where cost of mitigation is less than cost of loss
D Shift responsibility for the risk to a third party (ISP MSSP Insurance etc.)

The threat source is highly motivated and sufficiently capable and controls to prevent the vulnerability from being exercised are ineffective. Which likelihood rating does this describe?
A. High
B Medium
C Low
D None of the above

Which of the following is not part of the process for assessing security controls according to NIST SP 800 53A 1?
A. Study
B. Develop
C Conduct
D Analyze

What tool would be best to automatically detect your network and construct a complete and easy to view network map?
A Firewalk
B Path Analyser Pro
C. LANsurveyor
D SNMP

What is the high water mark for an information system?
A Highest Potential Threat value assigned to each Security Objective (AIC) for all Security Categories resident on the system and the overall classification of the system.
B. Highest Potential Impact value assigned to each Security Objective (AIC) for all Security Categories resident on the system and the overall classification of the system.
C Lowest Potential Vulnerability value assigned to each Security Objective (AIC) for all Security Categories resident on the system and the overall classification of the system.
D Marks on the server room wall to evaluate level of water during a flood.

Which of the following families of controls belongs to the technical class of controls?
A. Physical and Environmental Protection
B System and Information Integrity
C System and Services Acquisition
D. Identification and Authentication

FIPS 200 is:
A A threat assessment program
B A document that lays out the incident response life cycle
C A short document describing categorization of information and information systems
D. A short document that describes the minimum security requirements for information and information systems

In risk management people and information and technology are examples of?
A. Assets
B Processes
C Services
D None of the above

What is the order of the Change Control Process?
A Request : Approval : Build : Impact Assessment : If successful Implement
B. Request : Impact Assessment : Approval : Build and or Test : Implement
C. Request : Impact Assessment : Build and or Test : Implement
D Request : Impact Assessment : Build and or Test : Approval : Implement

Which risk comes from a failure of the controls to properly mitigate risk?
A Inherent risk
B Residual Risk
C. Control Risk
D All of the above

The following should be taken into account when accepting the residual risk inherent in the project.
A The sensitivity or the criticality of the assets involved
B Uncertainty incorporated in the risk assessment approach itself
C The ability to shift responsibility for the risk to a third party
D. All of the above

#23
Certifications / CompTIA Security+
Last post by Richard - Nov 13, 2023, 10:40 AM
CompTIA Security+ Continuing Education (CE) *ABOUT*

1] Read/Sign Code of Ethics Policy (check both boxes at bottom)
@https://www.certmetrics.com/comptia/candidate/ce_sign_agreement.aspx

2] Pay CE Maintenance Fees (using PayPal)
@https://www.certmetrics.com/comptia/candidate/ecom_creq_ce_list.aspx
> Select CE Intent Level [CE CompTIA Security+] > Submit

3] Add CEUs (50 for Security+) from FedVTE (11APR2023 Catalog)

> Select CE Intent Level [CE CompTIA Security+] > Submit

3A] Printer > Select Activity > Training and Higher Education >

3B] *Optional* Work Experience for 3 years (9 CEUs)
- Supervisor-signed letter for 1 year work period



Add Continuing Education (CE) Credits: https://www.certmetrics.com/comptia/candidate/ce_summary.aspx
> Add CEUs > Submit(S+) > Training and Higher Education > Completed a Training Course (1 unit per hour) for Security+ CEUs > Accept Activity > Training Provider / Certification Vendor: U.S. Department of Homeland Security / FedVTE








>> Network-Specific Courses [HRS]
[13] Cisco CCENT Self-Study Prep
[15] Cisco CCNA Security Self-Study Prep*
> 12/19/22, 12/28/21
[09] Demilitarized Zone (DMZ) with IDS/IPS
[05] IPv6 Security Essentials Course*
> 12/8/22, 12/28/21
[03] Network Layer 1 & 2 Troubleshooting
[18] Network Security
[13] (x) Offensive and Defensive Network Operations (2015 NO LONGER VALID)
[09] Wireless Network Security (WNS)*
> NO LONGER VALID AS OF 2013
#25
Computers / Software
Last post by Richard - Nov 05, 2023, 03:09 PM
[ # ]
7-Zip 23.01 (x64) - Igor Pavlov - 5.52 MB

[ A ]
ActivID ActivClient 7.3.1 x64 - HID Global Corporation - 107 MB
Adobe Acrobat 2020 20.005.30524 - Adobe Systems Incorporated - 2.68 GB
Adobe Genuine Service 8.3.0.61 - Adobe Inc.
Apple Mobile Device Support 17.0.0.21 - Apple Inc. - 109 MB
Apple Software Update 2.7.0.3 - Apple Inc. - 4.05 MB
AV1 Video Extension - Microsoft Corporation - 3.60 MB
AVG TuneUp 23.3.15198.8344 - AVG - 293 MB

[ B ]
Battle.net - Blizzard Entertainment
Bonjour 3.1.0.1 - Apple Inc. 2.02 MB
Bubble Shooter Premium

[ C ]
Calculator - Microsoft Corporation - 36.0 KB
Camera - Microsoft Corporation - 16.0 KB
CCleaner 6.17.10746 - http://www.piriform.com - 58.14 MB
> 2023.10.19 - https://www.filepuma.com/download/ccleaner_6.17.10746-36807/download
Chrome Remote Desktop 1.0 - Google\Chrome
Chrome Remote Desktop Host 119.0.6045.21 - Google LLC - 48.8 MB
Cortona - Microsoft Corporation - 32.0 KB

[ D ]
Dev Home - Microsoft Corporation - 8.00 KB
Diablo III - Blizzard Entertainment
Disney+ - Disney - 3.38 MB
Docs 1.0 - Google\Chrome
Duke Nukem 3D: 20th Anniversary World Tour - Nerve\Gearbox Software, LLC

[ F ]
Family - Microsoft Corp. - 3.12 MB
Family Tree Maker 2019 24.2.1560 - Software MacKiev - 989 MB
Feedback Hub - Microsoft Corporation - 897 KB
FileZilla 3.65.0 - Tim Kosse - 42.7 MB

[ G ]
Gaming Services - Microsoft Corporation - 16.0 KB
Glary Utilities  6.1.0.1 - http://www.glarysoft.com - 26.81 MB
> 2023.10.31 - https://www.filepuma.com/download/glary_utilities_6.1.0.1-36924/download
Gmail 1.0 - Google\Chrome
Google Chrome (64bit) 119.0.6045.106 - 109.72 MB
> 2023.11.03 - https://www.filepuma.com/download/google_chrome_64bit_119.0.6045.106-36970/download
Google Drive 1.0 - Google\Chrome

[ H ]
HID Credential Management Client 4.0.288 - HID Global Corporation - 55.2 MB
HP Audio Control - Realtek Semiconductor Corp - 16.0 KB
HP Dock Accessory WMI Provider 1.2.0 - HP - 402 KB
HP Documentation 1.0.0.1 - HP Inc.
HP Notifications 1.1.28.1 - HP - 18.8 MB
HP Scan Basic Device Software 51.8.5837.2381 - HP Inc. - 503 MB
HP Security Update Service 4.4.4.170
HP Smart - HP Inc. - 854 KB
HP Support Assistant - HP Inc. - 4.16MB
HP Sure Recover 10.1.15.90 - HP Inc.
HP Sure Run Module 5.0.5.53 - HP Inc.
HP System Information - HP Inc. - 32.0 KB
HP TechPulse 4.23.159 - HP Inc. - 56.6 MB
HP USB-C Dock Audio Headset 6.3.9600.205 - Realtek Semiconductor Corp.
HP USB-C Dock G5 Firmware Installer 1.0.18.0 - HP Inc. 745 KB
HP Wolf Security - Console 11.1.1.565 - HP Inc.
Hulu - 168KB

[ I ]
InstallRoot 5.5 - DoD PKE - 62.2 MB
Intel(R) Computing Improvement Program 2.4.10577 - Intel Corporation - 55.7 MB
Intel(R) Management and Security Status - INTEL CORP - 56.0 KB
Intel(R) Wireless Bluetooth(R) 22.250.0.2 - Intel Corporation - 16.0 MB
Intel(R) Arc(TM) Control 1.73.5335.2 - Intel Corporation - 763 MB
Intel(R) Driver & Support Assistant 23.4.39.9 - Intel - 58.5 MB
Intel(R) Graphics Command Center - INTEL CORP - 317 KB
Intel(R) Optane(TM) Memory and Storage Management - INTEL CORP - 76.0 KB
iPod Support 12.11.3.7 - Apple Inc. - 51.9 MB
iTunes 12.13.0.9 - Apple Inc. 420 MB

[ L ]
Logitech Unifying Software 2.50.25 - Logitech - 4.59 MB

[ M ]
Malwarebytes version 4.6.6.294 - Malwarebytes
Maps - Microsoft Corporation - 8.3.0 MB
McAfee 1.10.252.1 - McAfee,LLC - 182 MB
Media Player - Microsoft Corporation - 456 KB
Microsoft ASP.NET Core 7.0.13.23520 - Microsoft Corporation - 33.8 MB
Microsoft ASP.NET Core 7.0.7.23274 - Microsoft Corporation - 33.8 MB
Microsoft Edge 119.0.2151.44 - Microsoft Corporation
Microsoft Edge Update 1.3.181.5
Microsoft Edge WebView2 Runtime 119.0.2151.44 - Microsoft Corporation
Microsoft GameInput 10.1.22621.3036 - 792 KB
Microsoft Office Professional Plus 2019 16.0.16924.20124 - Microsoft Corporation
#26
Computers / HP EliteBook 850 G8 Notebook P...
Last post by Richard - Nov 05, 2023, 08:37 AM
Thunderbolt devices using the Type-C port configuration are not currently supported.
USB Type-C port on the graphics card is not supported.

USB Port Check : FAILED
FAILURE ID : RPN0GX-ASPBRmMFGH4K-8D7G03
PRODUCT ID : 5C229UA
#27
Appliances / Toaster Oven
Last post by Richard - Oct 28, 2023, 12:34 PM
TOB-135N
#28
Computers / HP Software and Drivers
Last post by Richard - Oct 27, 2023, 11:58 AM
HP Software and Drivers - Updated : 10/27/2023

BIOS-System Firmware
01 - 230925 HP BIOS and System Firmware (S77) - 01.14.20 Rev.A - 14.5 MB - sp149352.exe

#29
Computers / HP EliteBook 845 G7 Notebook P...
Last post by Richard - Oct 27, 2023, 11:26 AM
HP EliteBook 845 G7 Notebook PC (1V4L6AV)

* System Information *
Product Name: HP EliteBook 845 G7 Notebook PC
Processor 1: AMD Ryzen 5 PRO 4650U with Radeon Graphics
Memory Size: 16384 MB
System BIOS: S77 Ver.01.05.00 05/14/2021

SERVICE---------------------------------
Born On Date: 03/15/2022
Serial Number: 2TK137069B
SKU Number: 2Z8Y9UC#ABA
Universally Unique Identifier (UUID): 981E6FC8E12E60429FF31E680B07B5EC
UUID (standard format): C86F1E98-2EE1-4260-9FF3-1E680B07B5EC
Asset Tracking Number: LDS0000972
Feature Byte: 3X476J6S6b7B7H7M7Q7W7m7s8uaBaEapaqa uawbUbhcAdUdpdqfPguhKhkjhk8mEnW.D3
System Board ID: 8760
System Board CT Number: PLYBH00WBFN03M

* Device specifications *
Processor: AMD Ryzen 5 PRO 4650U with Radeon Graphics 2.10 GHz
Installed RAM: 16.0 GB (15.3 GB usable)
Device ID: EB3E96AB-36C4-4213-B05C-DEC215A257F2
Product ID: ‎00329-00000-00003-AA376
System type: ‎64-bit operating system, x64-based processor
Pen and touch: ‎No pen or touch input is available for this display

* Windows specifications *
Edition: Windows 10 Enterprise
Version: 21H2
Installed on: 6/9/2023
OS build: 19044.3570
Experience: ‎Windows Feature Experience Pack 1000.19052.1000.0
#30
Phones / iPhone Xr
Last post by Richard - Oct 27, 2023, 11:15 AM
iOS Version:  17.1
Model Name:  iPhone Xr
Model Number:  MH563LL/A

Modem Firmware:  6.00.00
Network:  VZW Wi-Fi
Carrier:  Verison 56.0