Topic 1A Define Organizational PenTesting Flashcards
(251 cards)
Section 1A
What is penetration testing?
A proactive exercise that tests the strength of an organization’s security defenses.
Section 1A
Why might an organization conduct a Penetration Test?
To provide due diligence and due care in meeting compliance requirements.
Section 1A
What is essential to maintain during a PenTest?
A professional attitude at all times.
Section 1A
What should be done if indications of a compromise are discovered during testing?
Immediately report the details to the appropriate stakeholder.
Section 1A
What are the lesson objectives related to Penetration Testing?
- Define organizational Penetration Testing and recognize the CompTIA structured PenTesting process
- Acknowledge compliance requirements such as PCI DSS and GDPR
- Compare different standards and methodologies like MITRE ATT&CK, OWASP, and NIST
- Describe best practice methods for professionalism and confidentiality
Section 1A
What is the purpose of employing proactive processes in security architecture?
To secure systems against potential attacks.
Section 1A
What methods are included in securing systems?
- Patch and configuration management
- Security education, training, and awareness
Section 1A
What are administrative controls?
Security measures implemented to monitor adherence to organizational policies and procedures.
Section 1A
What does the Principle of Least Privilege state?
An object should only be allocated the minimum necessary rights, privileges, or information.
Section 1A
What is the difference between a vulnerability scan and a penetration test?
A vulnerability scan identifies weaknesses, while a penetration test actively exploits those vulnerabilities.
Section 1A
What is the primary goal of a PenTest?
To reduce overall risk by taking proactive steps to reduce vulnerabilities.
Section 1A
What type of controls ensure the confidentiality, integrity, and availability of system resources?
- Administrative controls
- Physical controls
- Technical or logical controls
Section 1A
What do physical controls do?
Restrict, detect, and monitor access to specific physical areas or assets.
Section 1A
What are technical or logical controls?
Automated protections to prevent unauthorized access or misuse.
Section 1A
Fill in the blank: PenTesting is also called _______.
[Ethical Hacking]
Section 1A
What is the outcome of a completed PenTest?
Results are documented in a report format and presented to stakeholders.
Section 1A
What is the importance of continually assessing security measures?
To defend against ongoing threats instead of waiting for a breach.
Section 1A
What is the definition of risk in cybersecurity?
Risk represents the consequence of a threat exploiting a vulnerability.
Section 1A
What can result from a risk in cybersecurity?
- Financial loss
- Business disruption
- Physical harm
Section 1A
What are the two main components that comprise risk?
- Threat
- Vulnerability
Section 1A
Define a threat in the context of cybersecurity.
A threat represents something such as malware or a natural disaster that can exploit a vulnerability.
Section 1A
What is a vulnerability?
A vulnerability is a weakness or flaw, such as a software bug, system flaw, or human error.
Section 1A
What is the formula for determining risk?
Risk = Threats X Vulnerabilities
Section 1A
What is a risk analysis?
A security process used to assess risk damages that can affect an organization.