Chapter 15 Flashcards

1
Q

The goal of what type of threat evaluation is to better understand who the attackers are, why they
attack, and what types of attacks might occur?

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of the process that takes a snapshot of the current security of an organization?

A

vulnerability appraisal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which item below is an imaginary line by which an element is measured or compared, and can be seen
as the standard?

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The comparison of the present state of a system to its baseline is known as what?

A

Baseline reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In order to minimize vulnerabilities in software, code should be subject to and analyzed while it is
being written in what option below?

A

code review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name for the code that can be executed by unauthorized users within a software product?

A

attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During a vulnerability assessment, what type of software can be used to search a system for port
vulnerabilities?

A

Port scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A port in what state below implies that an application or service assigned to that port is listening for
any instructions?

A

Open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An administrator running a port scan wants to ensure that no processes are listening on port 23. What
state should the port be in?

A

Closed port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An administrator needs to view packets and decode and analyze their contents. What type of
application should the administrator use?

A

protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is the term for a computer typically located in an area with limited security and loaded with
software and data files that appear to be authentic, yet they are actually imitations of real data files?

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the term for a network set up with intentional vulnerabilities?

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is another term used for a security weakness?

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which scan examines the current security, in a passive method?

A

vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the end result of a penetration test?

A

penetration test report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which tester has an in-depth knowledge of the network and systems being tested, including network
diagrams, IP addresses, and even the source code of custom applications?

17
Q

A service contract between a vendor and a client that specifies what services will be provided, the
responsibilities of each party, and any guarantees of service, is known as a:

A

Service Level Agreement (SLA)

18
Q

What term below describes a prearranged purchase or sale agreement between a government agency
and a business?

A

Blanket Purchase Agreement (BPA)

19
Q

What security goal do the following common controls address: hashing, digital signatures,
certificates, nonrepudiation tools?

20
Q

What term below describes the start-up relationship between partners?

A

On-boarding