1A: Define Organizational Pentesting Flashcards
1.2 Explain the importance of scoping and organizational/customer requirements. 4.3 Explain the importance of communication during the penetration testing process.
What are the three controls utilized to ensure CIA of system resources?
- Administrative Controls
- Physical Controls
- Technical or Logical Controls
Which of the three controls utilized to ensure CIA is a security measure implemented to monitor adherence to organizational policies and procedures?
Administrative Control
Which of the three controls utilized to ensure CIA is used to restrict, detect, and monitor access to specific physical areas or assets?
Physical Control
Which of the three controls (administrative, physical, technical/logical) utilized to ensure CIA, automate protection to prevent unauthorized access or misuse, and include Access Control Lists (ACLs), and Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS)?
Technical or Logical Control
Which principle states that an object should only be allocated the minimum necessary rights, privileges, or information in order to perform its role?
Principle of Least Privilege
What is the term that represents the consequence of a threat exploiting a vulnerability which can result in financial loss, business disruption, or physical harm?
Risk
What is the formula for defining risk?
Risk = Threat x Vulnerability
What term represents something such as malware or a natural disaster, that can accidentally or intentionally exploit a vulnerability and cause undesirable results?
Threat
What term is a weakness or flaw, such as a software bug, system flaw, or human error that can be exploited by a threat?
Vulnerability
What type of analysis is a security process used to assess risk damages that can affect an organization?
Risk Analysis
What type of appliance is an all-in-one security appliance and agent that combine the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and so on.
Unified Threat Management (UTM) Appliance
What term defines the cyclical process of identifying, assessing, analyzing, and responding to risks.
Risk Management
What are the four steps of the CompTIA structured PenTesting process?
- Planning and Scoping
- Information Gathering and Vulnerability Scanning
- Attacks and Exploits
- Reporting and Communication
What are the eight steps of the expanded CompTIA structured PenTesting process? (acronym: srsgmcar)
- Planning and Scoping
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Covering Tracks
- Analysis
- Reporting