Domain 6: Security Assessment and Testing Flashcards

1
Q

What are the three major component s of a security assessment program?

A

Security Tests, Security Assessments, Security Audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do security tests do?

A

Verify that a control is functioning properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are security assessments?

A

comprehensive reviews of the security of a system, application, or other environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do security audits do?

A

evaluations performed with the purpose of demonstrating the effectiveness of controls to a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three main categories of vulnerability scans

A

network discovery scans, network vulnerability scans, and web application vulnerability scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Activity Scanning

A

scan a range of IP addresses searching for open network ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP SYN Scanning

A

sends a single packet to each scanned port with a SYN flag set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP Connect Scanning

A

opens a full connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP ACK Scanning

A

sends a ACK flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XMAS Scanning

A

sends FIN, PSH, and URG flags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

False Positive

A

reports a vulnerability when one does not exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

False Negative

A

fails to report a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTP Port

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH Port

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Telent

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMTP

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS

18
Q

HTTP

19
Q

POP3

20
Q

NTP

21
Q

HTTPS

22
Q

MS SQL Server

23
Q

Oracle

24
Q

H.323

25
PPTP
1723
26
RDP
3389
27
Penetration Testing
attempts to exploit systems
28
White Box Pen Testing
attackers have detailed information
29
Black Box Pen Testing
attackers have no info
30
Gray Box Pen Testing
attackers have partial knowledge
31
Fagan Code Review 6 steps
Planning, Overview, Preparation, Inspection, Rework, and Follow up
32
Static Testing
evaluates code without running it
33
Dynamic Testing
evaluates code in a runtime environment
34
Fuzz Testing
provides many different types of input to software to stress its limits
35
Mutation (Dumb) Fuzzing
takes previous input, manipulates it, to create fuzzed input
36
Generational (Intelligent) Fuzzing
develops data models and creates new fuzzed inputs
37
Interface Testing
assess the performance of modules against the interface specs
38
Application Programming Interfaces - APIs
standardized way for code to interact and be exposed to the outside world
39
Three types of interfaces to test during SW testing
APIs, UIs, and Physical Interfaces
40
User Interfaces (UIs)
GUIs and command line interfaces, provide end users with the ability to interact with the software
41
Physical Interfaces
exist in apps that manipulate machinery, logic controllers and other objects in the physical world
42
Test Coverage Analysis
estimate degree of testing conducted against new sw