Chapter 6: Security Assessment and Testing Flashcards

1
Q

Vulnerability Assesment

A

looking for weaknesses in everything etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PEN Testing

A

Looking to exploit weaknesses or ethical hacking..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

zero knowledge

A

black box testing - for someone with no internal knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Partial knowledge

A

limited access on network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

full knowledge

A

full knowledge of network…rouge administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability Scanning

A

Identifying

  • Active hosts on network
  • active and vulneable servies/ports on hosts
  • applications
  • operating systems
  • vulnerabilities associated with discovered OS & Apps
  • Misconfigured Settings

testing for compliance

establish foundation for PEN testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack methodology

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attack methodology part 2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pen testing consideration

A

3 basic requirements:

  • Meetin with Senior mgmt to determine the goal of the Assessment
  • Document Rules of Engagement
  • Get sign off from Senior mgmt.

It could disrupt productivity and systems

Purpose is to determine subjects ability to withstan an attack and determine effectiveness of current security measures.

***test should test and document*** not fix or suggest.. don’t violate seperation of duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IDS

A

intrusion detection system - passive in actons

part of a layered defense passive in activity.

needs an interface in promiscous mode - packet sniff whole network…card can capture all traffic.

port span or mirroring needs to be enabled to view all traffice on switch port.

IPS is active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS Categories

A

Host Based

Network Based

the anlysis engine is what makes it an IDS>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HIDS

A

Host based intrusion detection system.

cane be operating system and application specifi- might understand the latest attack against a certain service on a host

they can look at data post-encryption.

cons

systems resources, not scalable, it can be disabled if attacked..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

network base ids

A

look for DOS

IPS port number

brue force tunnneling etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ids analysis engine

A

pattern matching based on signature

profile matching system profile matching base on normal behavior…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

evasion attack

A

flying under the RADAR many small attacks from different directions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

insertion attack

A

geared towards signature based systemes adding meaningless info to a known attack.