Domain 6 - Security assessment and testing Flashcards

1
Q

Static testing

A

we passively test the code, we do not run it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dynamic testing

A

we tests code while executing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fuzzing

A

a black box testing that submits random, malformed data as inputs into software programs to determine if they will crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Penetration Testing or white hat hacking

A

we pay someone to test our security by trying to compromise our safeguards. This is testing both our organization’s physical and logical perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Synthetic Transactions/Monitoring

A

building scripts or tools that simulate normal user activity in an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is PCI-DSS a law

A

no, its a standard for entities that issue or handle credit cards. The Industry agreed upon the standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HIPAA is what

A

Health Insurance Portability and Accountability Act of 1996. its a Health Information Privacy Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is HIPAA a law

A

Yes - its a law to protect your personal identifiable information and your personal health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the difference between SOC 2 type 1 and type 2

A

type 2 reports the effectiveness of the controls over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SOC 2 type 1 definition

A

report of management’s description of a service organization’s system and the suitability of the design of controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In software testing, component interface testing would test what?
A: process and security alerts when encountering errors
B: data handling passed between different units and subsystems
C: the functionality of a specific section of code
D: interfaced between components against the software design

A

B:
Explanation
Component interface testing: Testing can be used to check the handling of data passed between various units, or subsystem components, beyond full integration testing between those units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At the end of our software development project, we are doing interface testing. What are we testing?

A

all interfaces exposed by the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Penetration testers have found a vulnerability on some of our switches. The vulnerability is an exploitable, who would patch the switch?

A

The network team
Explanation
Penetration testers are only there to provide a report, they don’t fix or alter anything. As the security team we do not update switches, that is the responsibility of the networking team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One of the distinct phases of software testing is installation testing. What are we testing in this phase?

A

Installation testing: Assures that the system is installed correctly and working at actual customer’s hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prior to an external structured audit, we would often do an ‘unstructured’ audit. Who would perform that?

A

Unstructured audits: Internal auditors to improve our security and find flaws, often done before an external audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In our software testing we are doing, “unit testing”, what are we testing?

A

Tests that verify the functionality of a specific section of code

17
Q

Penetration Testing (Pen Testing) have very clear rules of engagement defined in a SOW (Statement Of Work)

A

Which IP ranges, time frame, tools, POC (point of contact), how to test, what to test.

18
Q

We are doing different types of audits in our organization. Who would perform a structured audit?

A

External Auditors

19
Q

Which phase could a penetration tester go to after they are finished with one of the “System browsing” phases?

A

Discovery
Install additional tools

20
Q

What could a vulnerability scan possibly help us find?

A

outdated software, missing patches and system misconfiguration

21
Q

We have hired a penetration testing company to find security flaws in our organization. They are at the enumeration phase, what are they doing?

22
Q

Pen testing phases

A

Planning
Reconnaissance
Scanning (enumeration)
Vulnerability assessment
Exploitation
Reporting.

23
Q

What would be the PRIMARY reason we use a specific server for storing our centralized logs, and only giving our administrators limited access?

A

to ensure the logs integrity

24
Q

We have hired a penetration tester, and she has been given partial knowledge of our organization and infrastructure. Which access level would that emulate?
A: an administrator
B: a senior executive
C: a manager
D: a normal employee

A

D: a normal employee
Explanation
Gray (Grey) box (Partial Knowledge) Pentesting: The attacker has limited knowledge; is a normal user, vendor, or someone with limited environment knowledge.

25
what is the formula for RISK
risk = threat x vulnerability there could be a vulnerability but if it causes no threat there there is also no risk
26
if you have a vulnerability but no threat, what is your risk?
there is no risk if there is no threat based off that specific vulnerability. Risk = threat X vulnerability
27
what are the 5 phases for pen testing
1. Discovery and Reconnaissance 2. Scanning and probing 3. exploitations 4. post-exploitation 5. reporting
28
what happens during the discovery and recon phase during pen testing
gather information regarding the target(s)
29
what happens during the scanning and probing phase during pen testing
utilize gathered information to probe for vulnerabilities and identify entry points
30
what happens during the exploitation phase during pen testing
utilize approved methods to exploit vulnerabilities and attempt to gain access
31
what happens during the post-exploitation phase during pen testing
continue the attack by attempting further exploits using the access gained
32
what happens during the reporting phase of pen testing
document and present report on action taken, exploits achieved, suggested remediation
33
what should an organization do after the report phase of a pen test
remediate and retest: the org should address any vulnerabilities discovered, and the pen testers repeat the test to identify if the remediation was successful
34
what are synthetic transactions
are automated activities run against a monitored target t measure its performance. example: for a web application, this might involve logging in with a test user account to verify if the application responds to the log request or returns data in response to queries for DNS or DHCP, the synthetic transaction is a request for a name resolution or an IP address Heartbeat monitoring, a detective control that identifies services that are offline or unresponsive is a synthetic transaction.