Lecture 2b Flashcards

(90 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is penetration testing?

A

Penetration testing attempts to exploit vulnerabilities to uncover new vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is planning the most important step in a penetration test?

A

Planning prevents test creep and avoids unnecessary legal issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why conduct a penetration test instead of just a network scan?

A

Network scans find only surface problems and are often automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who can perform penetration tests internally?

A

Internal security personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are advantages of internal penetration testers?

A

Little or no additional cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are disadvantages of internal penetration testers?

A

Inside knowledge may bias results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who are external penetration testers?

A

Contracted pen testing consultants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are advantages of external pen testing consultants?

A

Expertise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a disadvantage of external pen testing consultants?

A

Risk that sensitive information could be sold to competitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is crowdsourced penetration testing?

A

Using many testers via the internet with bug bounty programs rewarding vulnerability discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are advantages of crowdsourced penetration testers?

A

Faster testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do rules of engagement in penetration testing define?

A

The limitations or parameters of the test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name three categories of rules of engagement.

A

Timing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does timing in rules of engagement specify?

A

When testing will occur including start/stop dates and if during business hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does scope in rules of engagement include?

A

Test boundaries like environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is required before starting a penetration test under authorization rules?

A

Prior written approval signed by all parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does exploitation mean in rules of engagement?

A

The level of vulnerability exploitation allowed during the test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When should pen testers communicate with the organization?

A

At initiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does cleanup involve after a penetration test?

A

Removing all test-related software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What should a penetration test report include?

A

Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the two main phases of performing a penetration test?

A

Reconnaissance and penetration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is footprinting in reconnaissance?

A

Gathering preliminary information from outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is active reconnaissance?

A

Directly probing for vulnerabilities that may alert security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is passive reconnaissance?
Gathering information without raising alarms
26
What is war driving?
Searching for wireless signals while moving in a vehicle or on foot.
27
What is war flying?
Searching for wireless signals using drones or UAVs.
28
What does phase two penetration involve?
Simulating threat actor actions to compromise network systems progressively.
29
What does pivoting mean in penetration testing?
Using one compromised system to access others toward the ultimate target.
30
Why must penetration tests be manual and carefully designed?
To mimic threat actors and adapt to vulnerabilities thoughtfully.
31
What is vulnerability scanning?
A frequent ongoing process to identify vulnerabilities and monitor cybersecurity progress.
32
How does vulnerability scanning differ from penetration testing?
Scanning is continuous and automated; penetration testing is manual and periodic.
33
What are two main types of vulnerability scans?
Credentialed and non-credentialed scans.
34
What is a credentialed scan?
A scan using valid authentication credentials to mimic a threat actor.
35
What is an intrusive scan?
A scan that attempts to exploit found vulnerabilities.
36
What is a non-intrusive scan?
A scan that only detects vulnerabilities without exploiting them.
37
What should be defined before conducting a vulnerability scan?
Target devices
38
What is important when examining vulnerability scan results?
Assessing importance
39
What are false positives in vulnerability scanning?
Alarms triggered without actual vulnerabilities.
40
How can false positives be identified?
By correlating scan data with internal data like log files.
41
What is threat hunting in relation to vulnerability scanning?
Using proactive searches to enhance vulnerability detection.
42
What are two data management tools used for collecting and analysing vulnerability scan data?
Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR)
43
What does SIEM stand for?
Security Information and Event Management
44
List three typical features of a SIEM tool.
Aggregation, Correlation, Automated alerting and triggers
45
What feature of SIEM ensures all logs are in sync by time?
Time synchronisation
46
What is the purpose of event duplication in SIEM?
To identify and manage repeated events
47
What additional analysis can SIEM perform related to threat actors' communications?
Sentiment analysis
48
What is sentiment analysis used for in cybersecurity?
Identifying and categorising opinions to determine the writer's attitude
49
What does SOAR stand for?
Security Orchestration Automation and Response
50
How does SOAR differ from SIEM?
SOAR combines more comprehensive data gathering and automates incident responses
51
What is threat hunting?
Proactively searching for cyber threats that have gone undetected in a network
52
What critical premise does threat hunting start with?
Threat actors have already infiltrated the network
53
Name two types of crowdsourced attack data used in threat hunting.
Advisories and bulletins, Cybersecurity threat feeds
54
What is security management focused on?
Ensuring the protection of assets, people, and information
55
Why is security management important for businesses?
To prevent legal consequences, financial losses, and reputation damage
56
What are the three principles in the CIA triad?
Confidentiality, Integrity, Availability
57
Define confidentiality in the CIA triad context.
Only approved individuals can access sensitive information
58
Give an example illustrating confidentiality.
Protecting a credit card number used for online purchase from unauthorized access
59
What does integrity ensure in information security?
Information is correct and unaltered by unauthorized persons or malicious software
60
Give an example of an integrity violation.
Changing a purchase amount from $10,000 to $1
61
What is availability in the CIA triad?
Authorized users can access information when needed
62
Why is availability important in business operations?
It supports continuous operations and business continuity
63
List one pro and one con of confidentiality from the CIA triad.
Pro: Privacy protection; Con: Complex access management
64
List one pro and one con of integrity from the CIA triad.
Pro: Data accuracy; Con: Resource intensive
65
List one pro and one con of availability from the CIA triad.
Pro: Continuous operations; Con: Vulnerable to DDoS attacks
66
Name four types of external cybersecurity resources available to organizations.
Frameworks, Regulations, Legislation, Standards
67
What is a cybersecurity framework?
A series of documented processes defining policies and procedures for security controls
68
Name two common cybersecurity frameworks.
NIST, ISO
69
What are the five core functions of the NIST Cybersecurity Framework?
Identify, Protect, Detect, Respond, Recover
70
What does the Identify function in NIST CSF involve?
Understanding and managing cybersecurity risk related to systems, people, assets, data, and capabilities
71
What is the purpose of the Protect function?
To develop and implement safeguards to limit or contain cybersecurity event impacts
72
What does the Detect function focus on?
Timely discovery of cybersecurity events
73
What is the main goal of the Respond function?
To take action to contain the impact of detected cybersecurity incidents
74
What does the Recover function ensure?
Timely recovery to normal operations after cybersecurity incidents
75
What are 'Categories' in the NIST CSF framework?
Groups of cybersecurity outcomes within each Function tied to specific activities
76
What are 'Subcategories' in the NIST CSF framework?
Specific technical or management outcomes that support the Categories
77
What are 'Informative References' in the NIST CSF?
Standards and guidelines illustrating methods to achieve Subcategory outcomes
78
What is regulatory compliance?
The process of adhering to regulations set by professional organizations or government agencies
79
Give examples of cybersecurity regulation categories.
Broadly applicable, Industry-specific, U.S. state, International regulations
80
What is the role of legislation in cybersecurity?
Laws enacted by national, territorial, or state governments to govern cybersecurity practices
81
What is a cybersecurity standard?
A document approved by recognized bodies providing framework, rules, or guidance for security
82
Give an example of a cybersecurity standard.
Payment Card Industry Data Security Standard (PCI DSS)
83
What are benchmarks or secure configuration guides?
Guidelines distributed by manufacturers to configure devices or software to be resilient to attacks
84
List three platforms or devices that may have specific secure configuration guides.
Network infrastructure devices, Operating systems, Web servers
85
Name some common information sources for cybersecurity.
Vendor websites, Conferences, Academic journals, Local industry groups, Social media
86
What is a Request for Comments (RFC) in cybersecurity?
Documents authored by experts detailing technical standards or protocols
87
What is penetration testing?
Attempting to exploit vulnerabilities like a threat actor would to assess security
88
What is the first phase of a penetration test called?
Reconnaissance or footprinting
89
Are vulnerability scans continuous or single events?
Vulnerability scans can be continuous or periodic, penetration tests are usually single events
90
Which two tools are used for collecting and analysing security event data?
SIEM and SOAR