Domain 5: Procedures Flashcards

1
Q

What is the importance of documenting security assessments?

A

Documentation provides evidence of testing, helps in tracking progress, and aids in compliance and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should be included in a penetration testing report?

A

Executive summary, findings, recommendations, risk assessment, and remediation strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the importance of change management in security.

A

Change management ensures that changes to systems are made systematically to avoid introducing new vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some common post-exploitation techniques?

A

Maintaining access, escalating privileges, and covering tracks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some best practices for securing a web application?

A

Input validation, using HTTPS, implementing proper authentication and authorization, and regularly updating software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a risk assessment?

A

The process of identifying, analyzing, and evaluating risks to an organization’s information systems and assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the process of incident response.

A

Identifying, analyzing, containing, eradicating, recovering from, and learning from security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly