Domain 5: Procedures Flashcards
What is the importance of documenting security assessments?
Documentation provides evidence of testing, helps in tracking progress, and aids in compliance and reporting.
What should be included in a penetration testing report?
Executive summary, findings, recommendations, risk assessment, and remediation strategies.
Describe the importance of change management in security.
Change management ensures that changes to systems are made systematically to avoid introducing new vulnerabilities.
What are some common post-exploitation techniques?
Maintaining access, escalating privileges, and covering tracks.
What are some best practices for securing a web application?
Input validation, using HTTPS, implementing proper authentication and authorization, and regularly updating software.
What is a risk assessment?
The process of identifying, analyzing, and evaluating risks to an organization’s information systems and assets.
Describe the process of incident response.
Identifying, analyzing, containing, eradicating, recovering from, and learning from security incidents.