3.1 Security Assessment Flashcards

1
Q

(Methods)

Malware Sandboxing

A

practice of isolating real or potential malicious code into a safe and restricted environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(Methods)

Memory Dumping

A

helps organization proactively discover and mitigate memory and application vulnerabilities by dumping software to the hard drive for offline analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(Methods)

Runtime Debugging

A

allows analysis of code while it is actively running in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Methods)

Reconniasance

A

methodological process of determining specific details about a target as possible before attempting to hack it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(Methods)

Fingerprinting

A

process of determining specific details about a system, including port numbers, services, operating systems, vulnerabilities and accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(Methods)

Code Review

A

Proofreading of source code to discover and mitigate software vulnerabilities before they make it into the finished product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(Methods)

Social Engineering

A

manipulating or compromising people into revealing confidential information

  • impersonation
  • phishing
  • spear phishing
  • whaling
  • reverse social engineering
  • spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Methods)

Pivoting

A

process of compromising a host in order to use that host to compromise other hosts on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Methods)

OSINT

A
  • Open Source Intelligence
  • the collection of valuable information from public sources
  • Social Media
  • Whois
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Methods)

Routing tables

A

record on a router that contain route and network destination information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(Methods)

DNS records

A

Provide important system identifiers to help clients translate system hostnames to IP addresses as well as reverse IP addresses to hostnames, and to help clients locate servers that provide services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(Methods)

Search Engines

A

provide easy access to information about a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Types)

Penetration Testing

A

simulating attacks on organizational targets in order to prepare organisations for malicious hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Types)

Black Box Pen Testing

A

simulates black hat hackers by starting off pen testing without prior knowledge of the organizational network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Types)

White box pen testing

A

simulates a malicious administrator who has complete knowledge of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(Types)

Grey box pen testing

A

simulates a malicious non-administrator who has partial knowledge of the network

17
Q

(Types)

Vulnerability Assessment

A

employ various techniques to discover vulnerabilities but not exploit them

18
Q

(Types)

Self-assessment

A

in-house vulnerability assessments done by local staff

19
Q

(Types)

Tabletop exercises

A

brainstorming sessions conducted by security professionals and other stakeholders to discuss an upcoming security assessment

20
Q

(Types)

Internal and External audits

A
  • Internal audits local security staff audit the strengths and weaknesses of security controls
  • External audits employ a third party to audit the strengths and weaknesses of security controls
21
Q

(Types)

Color team exercises

A

pit offensive and defensive teams penetration testers to ensure complete security posture is assessed

22
Q

(Types)

Red/blue/white teams

A
  • Red teams simulate malicious attacks
  • Blue teams respond to the res team attacks with analysis techniques
  • White team referee the red and blue teams