Chapter 18: Security Assessments Flashcards

1
Q

BAS

A

breach and attack simulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

breach and attack simulations

A

automated systems which launch simulated attacks against a target environment and generate reports on their findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

synthetic transactions

A

scripted events which mimic behaviors of real users and allow security professionals to systematically test the performance of critical services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

misuse case

A

use case which includes threat actors and the tasks they want to perform on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

test coverage

A

a measure of how much of a system is examined by a specific test (or group of tests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

interface testing

A

systematic evaluation of a given set of exchange points for data between systems and/or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internal audits are the preferred approach when …

A

the budget for security is limited or nonexistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

security audit process does not include

A

a management review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

external audit

A

to ensure contractors are meeting contractual obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

compliance audit

A

applies regulatory or industry standards and would almost certainly be a third-party audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

scanning hosts for malware

A

anti-virus not vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

to protect security event logs from tampering …

A

use remote logging over simplex communications media; the remote logger would have to be compromised to tamper with logs and the simplex channel hinders the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

synthetic transactions are …

A

a way to test the behavior and performance of critical services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

misuse case testing allows ..

A

org to document an adversary’s desired actions on a system and the controls meant to thwart them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

fuzzing

A

technique for detecting flaws in code by bombarding it with massive amounts of random data; not part of a code review, which focuses on analyzing the source code and not its response to random data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly