1.4 Threat Management Flashcards
according to the CySA+ objectives, what are the six rules of engagement for penetration testing?
timing scope authorization exploitation communication reporting
is a DHCP server normally placed inside a DMZ?
no
what is meant by the term exploitation in regards to rules of engagement in penetration testing?
all exploits that will be attempted during a scan
what is decomposition?
the process of breaking software or malware down to discover how it works
what is meant by the term scope in regards to vulnerability testing?
the devices or parts of the network that can be scanned and the types of scans to be performed
which technology enables a LAN to use one set of IP addresses for internal traffic and a second set of addresses for external traffic, while hiding internal addresses or address space?
NAT
which assessment determines whether network security is properly configured to rebuff hacker attacks?
penetration test
what is the purpose of network segmentation?
to isolate a group of devices
what can be used to run a possibly malicious program in a safe environment?
sandbox
which term is used for the process of verifying the integrity of a file by using a hashing algorithm?
fingerprinting or hashing
what is the purpose of the blue team in a training exercise?
defending the device or network
which documentation reduces the likelihood that you have received counterfeit equipment?
OEM (original equipment manufacturer) documentation
which type of connectivity provides a remote user the ability to safely connect to his or her corporate network while maintaining data confidentiality and integrity?
VPN
what is the purpose of the red team in a training exercise?
attacking the devices or network
what is meant by the term timing in regards to penetration testing?
the time when the test should occur and when it should not occur