CISSP Domain 6 Flashcards

1
Q

Security audit types

A

Internal: Org performs
External: big4
Third party: EY auditing your third party behalf of another organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Soc1 , SoC 2 and SoC 3

A

Finance

Trust security - CIAP, nda to be signed

Trust security- can be shared public disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type 1 and Type 2 reports

A

Type 1: documentation review by auditor

Type 2: Effectiveness of controls over period of time , at least 6 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 types of vulnerability scans

A

Scan to be done on IP ranges and open ports

Network discovery scan

Network vulnerability scans

Web application scans

Database vulnerability scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network discovery scan techniques

A

TCP SYN scan- half open scanning

TCP connect scan- open a full connection in specified port

TCP ack scan- Determine rules enforced by the firewall technology

UDP scanning- remote system using UDP protocol and checking UDP services

X mas scanning- FIN, PSH and URG flags set “ lit up like a Christmas tree”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network vulnerability scans

A

Database of known vulnerability instead of detection of open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authenticated scans

A

improve scanning and accuracy to reduce false positives
Scanner has read only access to servers getting scanned and can read config info from the targeted system when analysis testing results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerability management flow

A

Detection

Validation

Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pen test process

A

Planning: Rules of engagement

Info gathering and discovery

Attack

Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

White box test

A

Known environment test

By-pass reconciance test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Testing your software principle

A

Never depend on users behaving properly. Software to expect the unexpected. This is known as exception handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Code Review

A

Planning
Overview
Preparation
Inspection
Re-work
Follow-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code Review - Fagan

A

Peer review- manual walkthrough
Senior developer review
Automated review of tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Static review

A

Without running and analysing source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dynamic testing

A

Software in runtime testing and can include *synthetic transactions**

Scripted transaction with known results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fuzz testing and Categories

A

Different types of inputs to software to stress it’s limits and find previously undetected flaws

  1. Mutation (Dumb) fuzzing: Previous input from app
  2. Generational (Intelligent) fuzzing:
    Develop data model and creates new fuzzed input
17
Q

Interface testing

A

API

GUI

Physical interface

18
Q

Misuse case testing

A

Ways that software users might attempt to misuse the application

19
Q

Test coverage analysis

A

Estimate degree of testing conducted against New software

Test coverage= number of use cases tested / total number of use cases

20
Q

Test coverage analysis - 5 common criteria

A

Branch coverage - If else conditions
Condition coverage - Logical based on inputs ?
Function coverage - returned results
Loop coverage - All loop
Statement coverage- every line of code executed ?

21
Q

Website monitoring

A

Passive monitoring - real user monitoring

Synthetic monitoring - Artificial transaction WAF ?

22
Q

Log reviews

A

Logging policy from gpo

Ntp sync

Siem

23
Q

Need to know, least prevlige and SoD

A

Security clearance

Permission+ rights

24
Q

Two persons control

A

Approval of two individuals for critical tasks

PAM solutions can create split password

25
Q

Split knowledge

A

Segregation of duties+ Two persons control into a Single solution

26
Q

PAM and MS PAM

A

Restrict access to privilege accounts or detect when accounts use elevated privilege

Ms pam is based on JIT ticket expires after 15 minutes of elevation of prevlige

27
Q

SaaS

A

Gmail - everything handled by csp

28
Q

PaaS

A

Customer will manage -App, data CSP provides platform like windows

29
Q

IaaS

A

Basic computing resources to customers. Servers, storage and network resources

Customer install os and apps, performs maintenance on OS and apps

30
Q

Public, private, community and hybrid

A

Private - SaaS, PaaS or IaaS

Community - Two or more org that have shared concern

Hybrid - two or more cloud bound together by a tech that provides data and app probability

31
Q

Scalability Vs Elasticity

A

Scalability - Computing resources
Handle work load

Requires shutting down the system

Elasticity - Computing resources can be created and destroyed when needed

Doesn’t require shutting down

32
Q

Configuration management

A

System deployed in secure, consistent state and stay secure, consistent throughout lifetime

33
Q

Provisioning

A

Install and configure OS and needed apps

Harden it based on its use

34
Q

Baselining

A

Starting point, In context of CM list of settings

Using images for baseline- steps

  1. Baseline system
  2. Image server deployed image
35
Q

Change management and primary goal

A

Changes do not cause outages by unauthorised changes

It affects A of CIA

36
Q

Change management steps

A

Request for change

Review the change

Approve / reject change

Test change

Schedule and implement change

Document change

37
Q

Patch management steps

A

Evaluates
Test patch
Approve patch
Deploy patch
Verify that patches are deployed - Vulnerability scan