Section 5: Monitoring, Scanning and Penetration Testing Flashcards

1
Q

Which pen tester would be given source code?

A

White box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why would a shared account pose a problem to monitoring?

A

Prevents you from monitoring or auditing an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which pen tester would be given no access before the test but, at the last minute, is given a diagram of the desktops?

A

Gray box testers are given at least one piece of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What needs to be established prior to a pen test commencing?

A

Rules of engagement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

While carrying out an unannounced pen test, how does the tester know if the internal security team is on to him?

A

He would have regular meetings with the client, who would tell him.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the scope of rules of engagement?

A

Determines whether the pen test is black, gray or white.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If the pen test has been announced to the IT team, what information should they give regarding the test before the test start?

A

Pen tester would provide their IP address so that they can establish whether or not it is the pen tester or an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main difference between a credentialed an a non-credentialed vulnerability scan?

A

Credentialed: more permissions than a non-credentialed, has ability to audit, scan documents, check account information, check certificates, provide more accurate information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

At what phase of a pen test does the tester return the systems to the original state or inform the IT team of vulnerabilities that need patching?

A

Cleanup phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is OSINT? Is it legal?

A

Open-source intelligence is legal intelligence collected from the public domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of the red team?

A

Fulfill the role of the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the blue team?

A

Fulfill the role of the defender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the white team?

A

Organize and judge the cybersecurity events, ensuring reports are accurate, correct countermeasures are recommended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of the purple team?

A

Carry out the rules of both red and blue teams, external consultants/auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When evaluating CVSS scores, which vulnerabilities should you deal with first?

A

Critical vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe a false positive.

A

When a monitoring system and manual inspection differ.

17
Q

What is a true positive?

A

When a monitoring system and manual inspection agree on events.

18
Q

What is the difference between intrusive and non-intrusive scans?

A

Intrusive: will cause damage.
Non-intrusive: passive and non-damaging.

19
Q

What is regression testing and who will carry it out?

A

Where a coding expert checks the code written for an application to ensure there are no flaws.

20
Q

When would dynamic analysis be carried out?

A

Evaluating a program where it is running in real-time.

21
Q

What is a syslog server and what purpose does it serve?

A

Collects data from various sources in an event logging database. Filters out legitimate events and forwards rest of data to SIEM server for further analysis.

22
Q

Why does a SIEM server rely on synchronized time clocks between all servers and devices that it collects data from?

A

SIEM puts events into chronological order. If clocks are not synced, events cannot be put into sequential order.

23
Q

What is the purpose of threat hunting?

A

To discovery whether they have been subjected to a cyber-attack. Information can be obtained from conference or threat feeds.