CISSP ch 15 Flashcards

1
Q

Security tests

A

verify that a control is functioning properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security assessments

A

comprehensive reviews of the security of a system, application or other tested environment

Identifies vulnerabilities in the tested environment. does not usually include actual mitigation of those vulnerabilities

Thoughtful review of the threat environment, current and future risks, and the value of the targeted environment

hould be addressed to the organization’s management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIST SP 800-53A

A

Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans = best practices in conduct security and privacy assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Specifications (NIST SP 800-53A)

A

documents associated with the system being audited (e.g., policies, procedures, requirements and designs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mechanisms (NIST SP 800-53A)

A

controls used within an information system to meet the specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Activities (NIST SP 800-53A)

A

actions carried out by people within an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Individuals (NIST SP 800-53A)

A

people who implement specifications, mechanisms and activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security audits

A

use many of the same techniques followed during security assessments but must be performed by independent auditors

Less routine than tests or assessments

Purpose of demonstrating the effectiveness of controls to a third party (as opposed to purely internal distribution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internal audits

A

performed by an organization’s internal audit staff and are typically intended for internal audiences

Reporting line that is completely independent of the functions they evaluate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAE

A

Chief Auditing Executive = may have reporting responsibility directly to the organization’s governing board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSAE 18

A

Statement on Standards for Attestation Engagements, document 18 ‘Reporting on Controls’ (produced by the American Institute of Certified Public Accountants / AICPA)

Provides a common standard to be used by auditors performing assessments of service organizations with the intent of allowing the organization to conduct an external assessment instead of multiple third-party assessments and then sharing the resulting report with cutomers and potential customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISAE 3402

A

International Standard for Attestation Engagements 3402 ‘Assurance Reports on Controls at a Service Organization’ = SSAE 18 equivalent used outside of U.S.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOC aduits

A

Service organization controls audit = SSAE 18 and ISAE 3402

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOC 1 engagements

A

asses the organization’s controls that might impact the accuracy of financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SOC 2 engagements

A

Assess the organization’s controls that affect the security (confidentiality, integrity and availability) and privacy of information stored in a system

SOC 2 audit results are confidential and normally are only shared outside the organization under and NDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SOC 3 Engagements

A

Assess the organization’s controls that affect the security (confidentiality, integrity and availability) and privacy of information stored in a system

SOC 3 audit results are intended for public disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Type I Reports

A

provide the auditor’s opinion on the description provided by management and the suitability of the design of the controls

Cover only a specific point in time, rather than an extended period

More of a documentation review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Type II reports

A

provide the auditor’s opinion on the operating effectiveness of the controls

The auditor actually confirms that the controls are functioning properly

Covers an extended period of time, at least six months of operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

COBIT

A

Control Objectives for Information and Related Technologies, maintained by ISACA

Common framework for conducting audits and assessments

Describes the common requirements that organizations should have in place surrounding their information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ISO 27001

A

standard approach for setting up an information security management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ISO 27002

A

goes into more detail on the specifics of information security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SCAP

A

NIST’s Security Content Automation Protocol = common framework for describing and evaluating vulnerabilities, and facilitates the automation of interactions between different security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CVE (SCAP)

A

Common Vulnerabilities and Exposures = naming system for describing security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CVSS (SCAP)

A

Common Vulnerability Scoring System = standardized scoring system for describing the severity of security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CCE (SCAP)

A

Common Configuration Enumeration = naming system for systems configuration issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CPE (SCAP)

A

Common Platform Enumeration = naming system for operating systems, applications and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

XCCDF (SCAP)

A

Extensible Configuration Checklist Description Format = language for specifying security checklists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

OVAL (SCAP)

A

Open Vulnerability and Assessment Language = language for describing security testing procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Vulnerability scans

A

automatically probe systems, applications and networks looking for weaknesses that may be exploited by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Network discovery scanning

A

variety of techniques to scan a range of IP addresses, searching for systems with open network ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

TCP SYN Scanning = half-open scanning (network discovery)

A

Sends a single packet to each scanned port with the SYN flag set, indicating a request to open a new connection

If the scanner receives a response that has the SYN and ACK flags set, this indicates that the system is moving to the second phase in the three-way TCP handshake and that the port is open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

TCP Connect Scanning (network discovery)

A

Opens a full connection to the remote system on the specified port

Used when the user running the scan does not have the necessary permissions to run a half-open scan (i.e., user cannot send hand-crafted packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

TCP ACK Scanning (network discovery)

A

Sends a packet with the ACK flag set, indicating that it is part of an open connection

May be done in an attempt to determine the rules enforced by a firewall and the firewall methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

UDP scanning (network discovery)

A

Performs a scan of the remote system using the UDP protocol, checking for active UDP services

Does not use the three way handshake, because UDP is a connectionless protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Xmas scanning (network discovery)

A

Sends a packet with the FIN, PSH and URG flags set

A packet with so many flags is said to be ‘lit up like a Christmas tree’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

nmap

A

most common tool used for network discovery scanning = provides the current status of ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Open (nmap)

A

the port is open on the remote system and there is an application that is actively accepting connections on that port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Closed (nmap)

A

the port is accessible on the remote system, meaning that the firewall is allowing access, but there is no application accepting connections on that port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Filtered (nmap)

A

Nmap is unable to determine whether a port is open or closed because a firewall is interfering with the connection attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Banner grabbing

A

technique used by port scanners, network vulnerability scanners and web vulnerability scanners to identify the variant and version of a service running on a service

Opens a connection to the service and reads the details provided on the welcome screen or banner to assist with version fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

netstat command

A

useful tool for examining the active ports on a system = lists all active network connections on a system as well as those ports that are open and awaiting new connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

network vulnerability scans

A

go deeper than discovery scans, don’t stop at detecting open ports but continue to probe a targeted system or network for the presence of known vulnerabilities

These tools contain databases of thousands of known vulnerabilities along with tests they can perform to identify whether a system is susceptible to each vulnerability in the system’s database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Authenticated scans

A

scanner has read-only access to the servers being scanned and can use this access to read configuration information from the target system and use that information when analyzing vulnerability testing results

44
Q

TCP Port 20

A

FTP file transfer protocol

45
Q

TCP Port 22

A

SSH secure shell

46
Q

TCP Port 23

A

Telnet (remote access)

47
Q

TCP Port 25

A

SMTP (unencrypted mail)

48
Q

TCP Port 53

A

DNS domain name system (domain name to IP address)

49
Q

TCP Port 80

A

HTTP (unencrypted)

50
Q

TCP Port 110

A

POP3 (email retrieval)

51
Q

TCP Port 123

A

NTP network time protocol, time synchronization

52
Q

TCP Port 21

A

FTP file transfer protocol

53
Q

TCP Port 135

A

Windows File Sharing

54
Q

TCP port 137

A

Windows File Sharing

55
Q

TCP port 138

A

Windows File Sharing

56
Q

TCP port 139

A

Windows File Sharing

57
Q

TCP port 445

A

Windows File Sharing

58
Q

TCP port 443

A

HTTPS

59
Q

TCP port 515

A

LPR/LPD (printing)

60
Q

TCP port 1433

A

Microsoft SQL Server

61
Q

TCP port 1434

A

Microsoft SQL Server

62
Q

TCP port 1521

A

Oracle

63
Q

TCP port 1720

A

H.323 (VoIP)

64
Q

TCP port 1723

A

PPTP (point to point tunneling, VPN)

65
Q

TCP port 3389

A

RDP remote desktop protocol

66
Q

TCP port 9100

A

HP JetDirect printing

67
Q

OpenVAS

A

open source vulnerability scanner

68
Q

Sqlmap

A

a commonly used open source database vulnerability scanner

69
Q

Penetration testing

A

goes beyond vulnerability testing techniques and actually attempts to exploit systems = Try to defeat security controls and break into a targeted system or application to demonstrate the flaw

70
Q

Metasploit framework

A

tool commonly used by penetration testers to automatically execute exploits against targeted systems

71
Q

White-box penetration test

A

known environment tests

provides the attackers with detailed information about the systems they target, bypassing many of the reconnaissance steps, shortening the time of the attack and increasing the likelihood of finding security flaws

72
Q

gray-box penetration test

A

partial knowledge tests = partially known environment tests

particularly common when black-box results are desired but costs or time constraints mean that some knowledge is needed to complete the testing

73
Q

black-box penetration test

A

unknown environment tests

does not provide attackers with any information prior to the attack

simulates an external attacker trying to gain access to information about the business and technical environment before engaging in an attack

74
Q

BAS platforms

A

breach and attack simulation platforms = seek to automate some aspects of penetration testing

75
Q

NIST 800-115

A

industry standard penetrating testing methodology

76
Q

OSSTMM

A

Open Source Security Testing Methodology Manual

industry standard penetrating testing methodology

77
Q

compliance checks

A

verify that all of the controls listed in a compliance plan are functioning properly and are effectively meeting regulatory requirements

78
Q

exception handling

A

process of handling unexpected activity (e.g., invalid input, improperly sequenced activity)

79
Q

code review / peer review

A

where developers other than the one who wrote the code review it for defects

80
Q

Fagan inspections

A

most formal code review processes

Planning

Overview

Preparation

Inspection

Rework

Follow-up

81
Q

SAST

A

static application security testing = evaluates the security of software without running it by analyzing either the source code or the compiled application

Involves the use of au

82
Q

DAST

A

dynamic application security testing = evaluated the security of software in a runtime environment and is often the only option for organizations deploying applications written by someone else

Testers often do not have access to the underlying source code

E.g., use of web application scanning tools to detect the presence of cross-site scripting, SQL injection or other flaws in web applications

May include the use of synthetic transactions (i.e., scripted transactions with known expected results); testers run synthetic transactions against the tested code and then compare the output of the transactions to the expected state

83
Q

IAST

A

Interactive application security testing = performs real-time analysis of runtime behavior, application performance, HTTP/HTTPS traffic, frameworks, components and background connections

84
Q

RASP

A

Runtime Application Self-Protection = a tool that runs on a server and intercepts calls to and from an application and validates data requests

85
Q

fuzz testing

A

a specialized dynamic testing technique that provides many different types of input to software to stress its limits and find previously undetected flaws = Supplies invalid input to the software, either randomly generated or specially crafted to trigger known software vulnerabilities

86
Q

Mutation (dumb) fuzzing

A

Takes previous input values from actual operation of the software and manipulates (or mutates) it to create fuzzed input

Might alter the characters of the content, append strings to the end of the content or perform other data manipulation techniques

87
Q

generational (intelligent) fuzzing

A

Develops data models and creates new fuzzed input based on an understanding of the types of data used by the program

88
Q

zzuf tool

A

automates the process of mutation fuzzing by manipulating input according to user specifications

89
Q

bit flipping

A

changing text so that it is almost identical to the original text, but with a modified bit (1 changed to 0)

90
Q

interface testing

A

assesses the performance of separately developed modules against the interface specifications to ensure that they will work together properly when all the development efforts are complete

91
Q

APIs

A

Application Programming Interfaces

Offer a standardized way for code modules to interact and may be exposed to the outside world through web services

Must be tested to ensure that they enforce all security requirements

92
Q

UIs

A

User Interfaces

E.g., GUIs (graphic user interfaces) and command-line interfaces

Provide end users with the ability to interact with the software

93
Q

test coverage analysis

A

used to estimate the degree of testing conducted against the new software

test coverage = number of use cases tested / total number of uses cases

A highly subjective calculation

94
Q

branch coverage (test coverage analysis)

A

Has every ‘if’ statement been executed under all ‘if’ and ‘else’ conditions?

95
Q

condition coverage (test coverage analysis)

A

Has every logical test in the code been executed under all sets of inputs?

96
Q

function coverage (test coverage analysis)

A

Has every function in the code been called and returned results?

97
Q

loop coverage (test coverage analysis)

A

Has every loop in the code been executed under conditions that cause code execution multiple times, only once, and not at all?

98
Q

statement coverage (test coverage analysis)

A

Has every line of code been executed during the test?

99
Q

passive website monitoring

A

Analyzes actual network traffic sent to a website by capturing it as it travels over the network or reaches the server

Provides real-world monitoring data that gives administrators insight into what is actually happening on a network

100
Q

RUM (website monitoring)

A

real user monitoring = a variant of passive monitoring where the monitoring tool reassembles the activity of individual users to track their interaction with a website

101
Q

active website monitoring / synthetic monitoring

A

Performs artificial transactions against a website to assess performance

102
Q

SIEM packages

A

security information and event management packages = automate much of the routine work of log review

103
Q

syslog functionality

A

present in many devices, operating systems and applications = used by SIEM packages to collect information

104
Q

Windows’ GPOs

A

Group Policy Objects = mechanism that can deploy and enforce standard policies through the organization = can deploy a logging policy

105
Q

NetFlow logs

A

network flow logs that provide records of the connections between systems and the amount of data transferred = particularly useful when investigating security incidents