Application Security Buzzwords Flashcards

(30 cards)

1
Q

What is SAST?

A

Static Application Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: DAST is performed on a live application.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which scanning method focuses on code analysis?

A

Static Application Security Testing (SAST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary goal of ‘Threat Modeling’?

A

To identify potential security threats and vulnerabilities in an application by reviewing the way that it has been designed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ‘OWASP’ stand for?

A

Open Worldwide Application Security Project (Formerly Open Web Application Security Project)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple choice: Which of the following is NOT a common application security testing technique?

A) Penetration Testing B) Code Review C) Load Testing

A

C) Load Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The following are all vendors of what type of security testing?

Snyk, Semgrep, Veracode, SonarQube, and Checkmarx

A

Static Application Security Testing (SAST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: _______ is the practice of simulating attacks on an application to identify security weaknesses.

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ‘Compliance Testing’?

A

Testing to ensure that an application meets specific regulatory and security standards (e.g. ISO27001 or SOC2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Application security testing should only be done at the end of the development process.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multiple choice: Which of the following is a common output of application security testing?

A) Code B) Vulnerabilities C) Patches

A

B) Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of ‘Security Code Review’?

A

To manually inspect source code for security flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: _______ refers to the process of assessing an application’s security posture on an ongoing basis.

A

Continuous Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does ‘Software Composition Analysis (SCA)’ do?

A

It identifies if third-party software with known vulnerabilities are used by applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: Security testing is only relevant for web applications.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are ‘False Positives’ in the context of security testing?

A

Instances where a vulnerability scanner incorrectly identifies a vulnerability that does not exist.

17
Q

Multiple choice: Which of the following tools is commonly used for SAST?

A) Burp Suite B) SonarQube C) Wireshark

18
Q

What does ‘Exploitability’ refer to in application security?

A

The likelihood that a vulnerability can be successfully exploited.

19
Q

Fill in the blank: _______ and _______ are two industry-standard systems for classifying vulnerabilities

A

CWEs and OWASP-Top-10

20
Q

What is the difference between ‘Black Box Testing’ and ‘White Box Testing’?

A

Black Box Testing does not require knowledge of the internal workings of the application, while White Box Testing does.

21
Q

True or False: Application security testing is a one-time activity.

22
Q

What is ‘Security Automation’?

A

The use of software tools to automate security testing processes.

23
Q

BurpSuite, ZAP (Zed Attack Proxy), Tenable, and AppCheck are all types of what?

A

DAST (Dynamic Application Security Testing) Tools

24
Q

What is the SDLC?

A

Software Development Lifecycle: Describes the software development process inside a business

25
Why are Business Logic Flaws difficult to detect through automation?
They require an understanding of how the application is intended to behave, so that ways to circumvent this can be identified
26
Who are CREST?
A governing body that accredits penetration testing companies, including Cytix
27
Who are the two market leaders in Cloud hosting?
AWS (Amazon Web Services) and Azure
28
The words "Agile", "Sprint", and "SCRUM" are used by what team inside a business?
The development team, to describe processes for fast-paced development
29
What is the difference between a CVE and a CWE
A CVE is a publicly-disclosed instance of a vulnerability in a specific piece of software A CWE is standardised way of classifying particular types of vulnerability
30
STRIDE, DREAD, and PASTA are all methodologies for what?
Threat Modelling