5.5 Flashcards

1
Q

Audits

A

Systematic evaluations of an organization’s information systems, applications,and security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purpose of audits

A

● Validate security measures
● Identify vulnerabilities
● Maintain compliance with regulatory standard
identify gaos in security policies, procedures or controls and ensure compliance with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

assessments

A

■ Detailed analysis to identify vulnerabilities and risks
■ Performed before implementing new systems or significant changes
■ Categories
● Risk Assessments
● Vulnerability Assessments
● Threat Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reconnaissance in Pentesting

A

Gathering information before a pentest
■ Types
● Passive
● Active
■ Environment Consideration
● Known
● Partially Known
● Unknown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Passive reconnaissance

A

Passive reconnaissance involves collecting information without directly interacting with the target system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Active reconnaissance

A

Active reconnaissance involves engaging directly with the target system or network to gather information actively, port scanning, vulnerability scanning etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attestation of findings

A

■ Formal, written declaration of audit or assessment results
■ Purpose
● Confirmation and documentation of outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

internal assessments

A

■ Conducted to identify and evaluate potential risks and vulnerabilities in an
organization’s information systems
■ Commonly performed before implementing new systems or making significant
changes to existing ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internal assessment processes

A

threat modeling
vulnerability assessment
risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

threat modeling exercise

A

Identifies potential threats to applications (e.g., SQL injection, XSS,
DoS attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MCIT Cybersecurity Self-Assessment

A

MCIT’s Cybersecurity Self-Assessment checklist is designed to help
organizations minimize data and cybersecurity-related exposures
● It assists in identifying areas where data security may need strengthening
● The checklist comprises yes-or-no questions with sections for comments
and action items
● Action items are assigned to specific individuals or groups responsible for
implementing corrective actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

examinations

A

Detailed inspections of an organization’s security infrastructure conducted
externally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of pen testing

A

physical
offensive (red teaming), actively seeks vulnerabilities and attempts to exploit them
defensive - blue teaming detecting and responding to attacks
integrated (purple teaming) combines blue and red

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

metasploit

A

■ Multipurpose computer security and penetration testing framework
■ Has a wide array of powerful tools for conducting penetration tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of attestations

A

software - ● Involves validating the integrity of software to ensure it hasn’t been
tampered with
■ Hardware Attestation
● Validates the integrity of hardware components to confirm they haven’t
been tampered with
■ System Attestation
● Validates the security posture of a system, often related to compliance
with security standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly