Chap 1 Flashcards
4 major phases of CompTIA’s pentest testing process
Planning and scoping; information gathering; and vulnerability identification; attacks and exploits; and reporting and communication
Other name for pen test
Ethical hacking
A protection element, such as permissions or firewall, designed to keep unauthorized individuals out of a system of network
Security control
What step is the most important in a successful pentest report?
Remediation
PCI DSS best practices requirements for pen testing
-perform annual (external and internal) pen test, complete remediation actions
-bi annual pen test conducted for network segmentation controls
-(also internal testing whenever changes are made in network infrastructure or applications)
2 main trains to perform pen test
-get an accurate picture of the results of an attack
-to be in compliance with industry regulations
Performs attacks on assets
Red team
Protecting assets
Blue team
Separation of duties and no direct conflict of interests is important in conducting a pen test. Which is why a separate security team should be the ones to test the security controls rather than the team who ________
Installed, configured, and manages the systems or networks. And should not be the ones implanting the security of the system
Pros and cons of either internal or external 3rd party conducting pen test
Pros of internal team:
Cheaper and allows for more regular tests
Pros of external 3rd party:
Not familiar with infrastructure, similar to a hacker
Fresh eyes evaluating your defense
Cons of 3rd party:
What are their qualifications? Will results be confidential? Cost?