Chapter 15 Flashcards

1
Q

verifying a control is functioning properly; include scans, pen tests

A

security tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

comprehensive reviews of a system’s security; involves a risk assessment

A

security assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

essentially an outsourced security assessment

A

security audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

two Third party audit standards

A

SSAE 18 - Statement on Standards for Attestation Engagements
ISAE 3402 - International Standard for Attestation Engagements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This level of SOC Engagement assesses the organization’s controls that might impact the accuracy of financial reporting

A

SOC 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This level of SOC Engagement assesses the organization’s controls that affect the security and privacy of information - these are usually confidential

A

SOC 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This level of SOC Engagement assesses the organization’s controls that affect the security and privacy of information and are intended for public disclosure

A

SOC 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This kind of SOC report provide the auditor’s opinion on the description provided by management and the suitability of the design of the controls.

A

Type I Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This kind of SOC report provides the auditor’s opinion on the operating effectiveness of the controls

A

Type II Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A framework for conducting audits that is maintained by ISACA

A

COBIT - Control Objectives for Information and Related Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIST language for describing and evaluating vulnerabilities

A

Security Content Automation Protocol (SCAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a language for specifying security checklists

A

XCCDF - Extensible Configuration Checklist Description Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a language for describing security testing procedures

A

OVAL - Open Vulnerability and Assessment Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a scan that only sends a SYN message but never finishes the handshake

A

TCP SYN / half-open scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a scan that completes a handshake, then closes the connection

A

TCP Connect Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a scan that sends an ACK message to test firewall configurations

A

TCP ACK Scan

17
Q

a scan that looks for open UDP ports

A

UDP scan

18
Q

a scan with the FIN, PSH, and URG flags set

A

Xmas Scan

19
Q

the most formal code review process, containing 6 steps

A

Fagan inspections

20
Q

6 steps of Fagan inspections

A
  1. Planning
  2. Overview
  3. Preparation
  4. Inspection
  5. Rework
  6. Follow-Up
21
Q

evaluating the security of software without running it by analyzing either the source code or the compiled application

A

static application security testing (SAST)

22
Q

evaluating the security of a software in a runtime environment

A

dynamic application security testing (DAST)

23
Q

scripted transactions with known expected results

A

synthetic transactions

24
Q

real-time analysis of runtime behavior, application performance, HTTP/HTTPS traffic, framework, components, and backend connections

A

IAST - Interactive Application Security Testing

25
Q

a tool that runs on a server and intercepts calls to and from an application and validates data requests

A

RASP - Runtime Application Self-Protection

26
Q

assessing the performance of modules against the interface specifications to ensure they are working together properly when development efforts are complete

A

interface testing