Security Assessment and Testing Flashcards

1
Q

¿Cuál es el objetivo del Vulenrability Assessment?

A

What I’m doing is looking for weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

¿Cuáles son los dos tipos de Vulnerability Assessment?

A

Physical/ Administrative/ Logical.

Identify Weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ejemplos de Vulenarbility Assessment Físicos.

A

Las puertas y/o ventanas cierra bien, políticas de escritorio limpio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ejemplos de Vulnerability Assessment Administrativos.

A

Pen-test, social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

¿Cuál es el objetivo de los penetration testings?

A

What looking is if we can exploit the weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

¿Cuál es el objetivo de los Red y Blue Teams?

A
Red Teams (attack)
Blue teams (defend)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

¿Cuáles son los tipos de pruebas para el pen-testing¡

A
  • Black Box
  • Gray Box
  • White box
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

¿Cual es el objetivo del Vulnerability Scanning?

A

Identifying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

¿Cuáles son los pasos de la metodología de ataque?

A
  • Reconnaisance
  • Footprinting Network
  • Fingerprinting
  • Vulnerability Assessment
  • The “attack”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

¿En qué consiste la etapa de Reconnaisance?

A

Gather Internet Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

¿En qué consiste la etapa de Footprinting Network?

A

Discover the essentials devices on your network, to map your network. NMAP, Ping sweep.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

¿En qué consiste la etapa de Fingerprinting?

A

Learn from the network. Identifying host information, port scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

¿En qué consiste la etapa de Vulnerability Assessment?

A

Identifying weaknesses in system configurations. Discovering unpatched SW.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

¿En qué consiste la etapa de Attack?

A

Penetration, privilege escalations, root kit, cover tracks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

¿Cuál es el propósito del pen-testing?

A

Overall purpose is to determine subjects ability to withstand an attack and determine effectiveness of current security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

¿Cuáles son los requerimientos básicos para poder realizar un pen-test dentro de una empresa?

A
  • Meet with senior management to determine the goal of the assessment.
  • Document rules of engagement.
  • Get sign off from senior management.
17
Q

Tester should not be the one suggestins remediation, true or false?

A

True, because this violates separation of duties.

18
Q

¿Cuáles son los tipos de pen test?

A
  • Physical security
  • Administrative Security
  • Logical Security
19
Q

Ejemplos de pruebas físicas de pentest:

A
  • Access into building or department.

- Wiring closets, locked file cabinets, offices, server room, sensitive areas.

20
Q

Ejemplos de pruebas Administrativas de pentest:

A
  • Help desk gving out sensitive information, data on disposed disks.
21
Q

Ejemplos de pruebas lógicas de pentest:

A
  • Attacks on systems, networks, communication.
22
Q

¿Cuáles son las características de los IDS?

A
  • Passive in action
  • Gathering information
  • Identify Suspicious activity
  • Log Activity
  • Respond (alert people)
23
Q

¿Cuáles son los componentes de un IDS?

A
  • Sensor - Data collector
  • Analysis Engine, signature database
  • User interface
24
Q

¿Qué hace un HIDS?

A

Examine the operation of a single system independently to determine of anything “off note” is going on.

25
A NIDS cannot look encripted data, true or false?
True.
26
¿Qué tipo de eventos registra un HIDS?
- Logins - System Log files - Application log files - File activity - Configuration files changes - Use of certain programs * Network traffic to/from PC
27
¿Cuáles son las ventajas de un HIDS?
- Can be operating system and application specific. | - Thay can look at data after it's been decrypted.
28
¿Cuáles son las desventajas de un HIDS?
- Only protec one machine - Use local system resources - Scalability
29
¿Qué es un NIDS?
Network based IDS, a concepto focused on watching an entire network and all associated. machines. Focuses specifically on netwokr traffic, in this case the sensor is sometimes called a traffic collector.
30
¿Qué tipo de eventos registra o busca un NIDS?
- Source IP - Destination IP - Protocol - Port numbers - Data content - DoS Attacks - Port scans - Malicious content
31
¿Cuáles son las ventajas de un NIDS?
A NIDS can see things that are happening on multiples machines, it gots a bigger picture and may see distributed attacks that a HIDS would miss.
32
¿Qué hace un Analysis Engine del tipo Pattern Machine?
SIgnature based, only as good as the last update. Does not protect against today attacks.
33
¿Qué hace un Analysis Engine del tipo Profile Machine?
Anomaly based systems, look for changes in normal behavior. | Anomaly/Behavior/Heuristics
34
¿En qué consiste un Evassion attack?
Many small attacks from different directions.
35
¿En qué consiste un Insertion attack?
Adding meaningless information (without modifying the payload) to a known attack.
36
¿Cuál es el objetivo de un honeypot?
Administrator hope that intruders will attack this system instead of their production systems.
37
¿Qué significan los términos "enticement" "entrapment"?
Enticement (tentacion) | Entrapment (atrapamiento, tender una trampa)