Quizes Flashcards
(159 cards)
In the penetration testing arena, overt and covert operations are defined as which of the following?
A- Black Teaming and White Teaming
B- Blue Teaming and Red Teaming
C- Blue Teaming and White Teaming
D- both the second and third option are correct
This statement is correct! In the penetration testing arena, overt and covert operations are generally defined as Red Team or Blue Team operations. These teams can work independently on different operations or together on the same operation. The RedTeam functions as an attacker in an effort to gain access to an organization’s infrastructure; generally, Red Team operations are close hold and not known to the network users. Blue Team operations are focused on assessing network defenses and identifying defensive solutions; they are generally conducted in cooperation with the system users.
Which of the following are objectives of most penetration testing activities?
A- to determine a subject’s ability to retaliate against an attack
B- to determine the effectiveness of current security measures
C- to identify areas of improvement
D- to determine the effectiveness of current security measures AND to identify areas of improvement
This statement is correct! Penetration testing is conducted with the tester acting as an attacker to identify vulnerabilities in the system. It both determines the effectiveness of current security measures and identifies areas for improvement
A White-Box tester hopes to achieve which of the following when performing a penetration test?
A- check for unauthorized hosts connected to the organization’s network
B- match allowed services with those defined in the organization’s security policy
C- collect computer forensics for evidence
D- both the first and second answer choice are correct
This statement is correct! In White-Box testing, the tester has access to design and implementation details and tools that will help analyze vulnerabilities. White-Box testing checks for unauthorized hosts connected to the organization’s network and also matches allowed services with those defined in the organization’s security policy.
Performing a penetration test is recommended for which of the following circumstances?
A- when a breach has occurred within the organization
B- being a system administrator with special privileges
C- when an organization requests a penetration test and provides written authorization
D- when a company requests a penetration test
This statement is correct! Because penetration testing is usually expensive and time consuming, it should only be performed when an organization requests a penetration test and provides written authorization.
Which of the following characteristics of external penetration firms makes them more effective than internal penetration testers?
A- They are not influenced by any previous system security decisions.
B- They are not influenced by knowledge of the current system environment or future system security plans.
C- They are likely to be more forthcoming to fully report security gaps.
D- All of the above are correct.
Correct! External penetration testing firms are not influenced by previous system security decisions, are not usually influenced by knowledge of the current system environment, and are likely to be more forthcoming in fully reporting security gaps.
Which of the following is an objective of penetration testing?
A- to provide a list of all unpatched computers
B- to identify attackers and attack vectors used
C- to document all user activities performed on the system
D- to test the system as a whole, including existing defense mechanisms
Correct! An objective of penetration testing is to test the system as a whole, including existing defense mechanism.
Penetration testers usually perform four steps to perform an attack and gain as much access as possible. The order of the four steps is which of the
following?
A- Step 1: Performing Reconnaissance, Step 2: Scanning and Enumeration, Step 3: Gaining Access, Step 4: Reporting Problems to Management
B- Step 1: Gaining Permission from Management, Step 2: Performing Reconnaissance, Step 3: Scanning and Enumeration, Step 4: Gaining Access
C- Step 1: Performing Reconnaissance, Step 2: Gaining Access, Step 3: Scanning and Enumeration, Step 4: Reporting Problems to Management
D- Step 1: Performing White Hat Testing, Step 2: Gaining Access, Step 3: Scanning and Enumeration, Step 4: Reporting Problems to Management
Correct! To perform an attack and gain as much access as possible, penetration testers first gain permission from
management; then perform reconnaissance; do scanning and enumeration; and finally, gain access.
Which of the following processes uses fingerprinting and foot printing to gather in-depth information about the target systems, such as open shares, operating systems, and user accounts?
A- interception
B- enumeration
C- manipulation
D- scanning
This statement is correct! Enumeration is the process by which hosts/devices are discovered on a network. It may also scan various ports on remote hosts in an attempt to further identify their functions.
The CIA triad is a major concept for cybersecurity professionals. Which of the following parts of the triad defines availability?
A- Prevention of unauthorized disclosure of sensitive data
B- Prevention of unauthorized changes to systems and data
C- Prevention of disruption of service and productivity
D- Prevention of lawsuits from contractors and other parties
This statement is correct. The prevention of disruption of service and productivity defines the availability component of the CIA triad.
The CIA triad concept that relates to appropriate access to sensitive information is which of the following? A- confidentiality B- integrity C- availability D- non repudiation
This statement is true. Confidentiality is a set of rules that limits access to information.
Hardware maintenance, redundancy, network communications, backups, and upgrades are significant to systems, and which of the following parts of the CIA triad is concerned with these tasks? A- confidentiality B- availability C- nonrepudiation D- authentication
This statement is true. Availability guarantees reliable access to the information by authorized people that includes all the tasks listed.
Several security models relate to different components of the CIA triad. Which of the models below address the three goals of integrity? A- The Clark–Wilson model B- Biba model C- Bell- LaPadula security model D- Lattice model
A
This statement is true. The Clark–Wilson Integrity Model provides a foundation for specifying and analyzing an integrity policy for a computing system and includes the three goals of integrity.
Classification categories for access control are based on evaluation of sensitivity or criticality. The generalized format for expressing the security
category, SC, of an information type is:
A- confidentiality, integrity, availability
B- confidentiality, integrity, assurance
C- confidentiality, integration, availability
D- confidentiality, integration, assurance
This statement is true. The generalized format for expressing the security category of an information type is as follows: SC information type = {(confidentiality, impact), (integrity, impact),(availability, impact)}
Asymmetric key encryption, which uses public and private keys to encrypt and decrypt data, is advantageous due to which of the following:
A- confidentiality, authentication, non repudiation
B- confidentiality, integration, availability
C- confidentiality, integrity, non repudiation
D- confidentiality, integrity, authentication
This statement is true. Due to the asymmetric key encryption process, confidentiality, authentication, and non repudiation are addressed.
What are two of the main security goals of the CIA triad? A- commercial and federal infrastructure B- confidentiality and integrity C- availability and refutability D- analysis and development
This statement is true. The CIA triad is a model of the main information security goals for organizations. This model includes confidentiality, integrity, and availability, and often extends to authentication and nonrepudiation.
Which of the following part of the CIA triad defines integrity?
A- prevention of the use of private information
B- prevention of unauthorized changes to company data
C- prevention of destruction of physical services
D- prevention of litigation of users
This statement is true. The definition of integrity is the assurance that the information is trustworthy and accurate, which would include the prevention of unauthorized changes to company data.
Confidentiality, integrity, and availability (the CIA triad) are important to the security of systems and networks. Several models relate to different components of this triad. Which one of the following models addresses the three goals of integrity? A- Clark–Wilson model B- Biba integrity model C- Bell -LaPadula security model D- all of the above
A
Correct! The Clark-Wilson model ensures data integrity through the application of rules and addresses the three goals of integrity.
These goals are to prevent any data modification by unauthorized parties, to prevent unauthorized data modification by authorized parties, and to maintain internal and external consistency.
A state machine model demands that no matter what input, output, or processing tasks take place, all states are secured. If all current states are secured, all further states will be secured. Which of the following is considered a state machine model? A- Clark- Wilson B- Bell -LaPadula C- Harrison -Ruzzo -Ullman (HRU) D- Lipner
B
Correct! The Bell- LaPadula security model emphasizes
confidentiality and provides a framework for the protection of sensitive or classified information. It is most often used to enforce access control for government and military applications and is considered a state machine model.
Which security model divides operations into different parts and requires different users to perform each part? This separation of duties prevents authorized users from making unauthorized modifications to data, thereby protecting data integrity. A- Bell- LaPadula model B- Biba model C- Clark- Wilson model D- noninterference model
C
Correct! The Clark-Wilson model ensures data integrity through the application of rules and addresses the three goals of integrity.
It divides operations into different parts and requires different users to perform each part (separation of duties), thereby preventing authorized users from making unauthorized modifications to data.
A security model that requires well- formed transactions and the separation of duties is called \_\_\_\_\_\_\_\_\_\_. A- lattice1 B- Brewer and Nash C- non interference D- Clark -Wilson
D
Correct! The Clark-Wilson model ensures data integrity through the application of rules and addresses the three goals of integrity.
It divides operations into different parts and requires different users to perform each part (separation of duties), thereby preventing authorized users from making unauthorized modifications to data. This model requires well- formed transactions.
What does the * (star) integrity axiom mean in the Biba model? A- no read up B- no write down C- no read down D- no write up
D
Correct! In the Biba model, the * (star) integrity axiom states that a subject at a given level of integrity must not write to any object at a higher level of integrity (no write up).
What is the Biba security model concerned with? A- confidentiality B- reliability C- availability D- integrity
D
Correct! The Biba security model ensures data integrity through the use of access controls.
Which security model divides operations into different parts and requires different users to perform each part? This separation of duties prevents authorized users from making unauthorized modifications to data, thereby protecting data integrity. A- Bell- LaPadula model B- Biba model C- Clark -Wilson model D- deducibility model
Correct! The Clark-Wilson model ensures data integrity through the application of rules and addresses the three goals of integrity.
It divides operations into different parts and requires different
users to perform each part (separation of duties), thereby preventing authorized users from making unauthorized modifications to data. This model requires well- formed transactions.
Which of the following properties mandates no read up, whereby a subject at a given security level must not read an object at a higher security level? This is also known as the confinement property. A- simple security property B- read "star" property C- discretionary security property D- none of the above
Correct! The simple security property in the Bell- LaPadula security model states that a subject at a given security level may not read an object at a higher security level (no read up).