Application Security Buzzwords Flashcards

1
Q

What is SAST?

A

Static Application Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: DAST is performed on a live application.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which scanning method focuses on code analysis?

A

Static Application Security Testing (SAST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary goal of ‘Threat Modeling’?

A

To identify potential security threats and vulnerabilities in an application by reviewing the way that it has been designed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ‘OWASP’ stand for?

A

Open Worldwide Application Security Project (Formerly Open Web Application Security Project)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple choice: Which of the following is NOT a common application security testing technique?

A) Penetration Testing B) Code Review C) Load Testing

A

C) Load Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The following are all vendors of what type of security testing?

Snyk, Semgrep, Veracode, SonarQube, and Checkmarx

A

Static Application Security Testing (SAST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: _______ is the practice of simulating attacks on an application to identify security weaknesses.

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ‘Compliance Testing’?

A

Testing to ensure that an application meets specific regulatory and security standards (e.g. ISO27001 or SOC2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Application security testing should only be done at the end of the development process.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multiple choice: Which of the following is a common output of application security testing?

A) Code B) Vulnerabilities C) Patches

A

B) Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of ‘Security Code Review’?

A

To manually inspect source code for security flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: _______ refers to the process of assessing an application’s security posture on an ongoing basis.

A

Continuous Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does ‘Software Composition Analysis (SCA)’ do?

A

It identifies if third-party software with known vulnerabilities are used by applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: Security testing is only relevant for web applications.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are ‘False Positives’ in the context of security testing?

A

Instances where a vulnerability scanner incorrectly identifies a vulnerability that does not exist.

17
Q

Multiple choice: Which of the following tools is commonly used for SAST?

A) Burp Suite B) SonarQube C) Wireshark

A

B) SonarQube

18
Q

What does ‘Exploitability’ refer to in application security?

A

The likelihood that a vulnerability can be successfully exploited.

19
Q

Fill in the blank: _______ and _______ are two industry-standard systems for classifying vulnerabilities

A

CWEs and OWASP-Top-10

20
Q

What is the difference between ‘Black Box Testing’ and ‘White Box Testing’?

A

Black Box Testing does not require knowledge of the internal workings of the application, while White Box Testing does.

21
Q

True or False: Application security testing is a one-time activity.

22
Q

What is ‘Security Automation’?

A

The use of software tools to automate security testing processes.

23
Q

BurpSuite, ZAP (Zed Attack Proxy), Tenable, and AppCheck are all types of what?

A

DAST (Dynamic Application Security Testing) Tools

24
Q

What is the SDLC?

A

Software Development Lifecycle: Describes the software development process inside a business

25
Q

Why are Business Logic Flaws difficult to detect through automation?

A

They require an understanding of how the application is intended to behave, so that ways to circumvent this can be identified

26
Q

Who are CREST?

A

A governing body that accredits penetration testing companies, including Cytix

27
Q

Who are the two market leaders in Cloud hosting?

A

AWS (Amazon Web Services) and Azure

28
Q

The words “Agile”, “Sprint”, and “SCRUM” are used by what team inside a business?

A

The development team, to describe processes for fast-paced development

29
Q

What is the difference between a CVE and a CWE

A

A CVE is a publicly-disclosed instance of a vulnerability in a specific piece of software

A CWE is standardised way of classifying particular types of vulnerability

30
Q

STRIDE, DREAD, and PASTA are all methodologies for what?

A

Threat Modelling