Chapter 6: Security Assessment & Testing Flashcards

1
Q

What is Mutation Testing ?

A

A white-box testing technique that involves making small changes to a program’s source code to evaluate the quality of software tests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Nikto?

A

A free software command-line vulnerability scanner that scans web servers for dangerous files/CGIs, outdated server software & other problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For each of these – Open/Closed Source, port scanner or vulnerability scanner?
1. Nmap
2. OpenVAS
3. MBSA
4. Nessus

A
  1. Open, port
  2. Open, vulnerability
  3. Closed, vulnerability
  4. Closed, vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the most common tool for assessing security awareness in an organization?

A

Surveys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s the difference between a TCP connect scan & a TCP SYN scan for identifying open ports?

A

TCP SYN scans generally require elevated privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Recording all user interaction with an application to ensure quality & performance is called…

A

Real User Monitoring (RUM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 4 types of coverage criteria commonly used when validating the work of a code testing suite?

A

Function, statement, branch, condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is OVAL ?

A

Open Vulnerability & Assessment Language, an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is XCCDF ?

A

Extensible Configuration Checklist Description Format, for creating security checklists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SCE ?

A

Script Check Engine, for making scripts interoperable with security policy definitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is covered in NIST 800-53A ?

A

Security & Privacy Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is covered in NIST 800-12 ?

A

Introduction to Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is covered in NIST 800-34 ?

A

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is covered in NIST 800-86 ?

A

Forensic Techniques for Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two common network ports on printers?

A

515 (LPR) & 9100 (LPD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name each of these report types: SOC 1, SOC 2, SOC 3.

A

SOC 1: Financial integrity
SOC 2: Confidential Security & Privacy
SOC 3: Report for 3rd Parties on Security & Privacy, including Auditor opinions & Management Assertions

17
Q

What is an ITSM ?

A

IT Service Management tracking.

18
Q

What is covered in NIST 800-115 ?

A

Information Security Testing & Assessment

19
Q

NIST specifies these as the 4 phases of an attack.

A

Gaining Access
Escalating Privileges
System Browsing
Installing Additional Tools