Domain 6 - Security assessment and testing Flashcards

1
Q

Static testing

A

we passively test the code, we do not run it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dynamic testing

A

we tests code while executing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fuzzing

A

a black box testing that submits random, malformed data as inputs into software programs to determine if they will crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Penetration Testing or white hat hacking

A

we pay someone to test our security by trying to compromise our safeguards. This is testing both our organization’s physical and logical perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Synthetic Transactions/Monitoring

A

building scripts or tools that simulate normal user activity in an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is PCI-DSS a law

A

no, its a standard for entities that issue or handle credit cards. The Industry agreed upon the standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HIPAA is what

A

Health Insurance Portability and Accountability Act of 1996. its a Health Information Privacy Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is HIPAA a law

A

Yes - its a law to protect your personal identifiable information and your personal health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the difference between SOC 2 type 1 and type 2

A

type 2 reports the effectiveness of the controls over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SOC 2 type 1 definition

A

report of management’s description of a service organization’s system and the suitability of the design of controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In software testing, component interface testing would test what?
A: process and security alerts when encountering errors
B: data handling passed between different units and subsystems
C: the functionality of a specific section of code
D: interfaced between components against the software design

A

B:
Explanation
Component interface testing: Testing can be used to check the handling of data passed between various units, or subsystem components, beyond full integration testing between those units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At the end of our software development project, we are doing interface testing. What are we testing?

A

all interfaces exposed by the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Penetration testers have found a vulnerability on some of our switches. The vulnerability is an exploitable, who would patch the switch?

A

The network team
Explanation
Penetration testers are only there to provide a report, they don’t fix or alter anything. As the security team we do not update switches, that is the responsibility of the networking team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One of the distinct phases of software testing is installation testing. What are we testing in this phase?

A

Installation testing: Assures that the system is installed correctly and working at actual customer’s hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prior to an external structured audit, we would often do an ‘unstructured’ audit. Who would perform that?

A

Unstructured audits: Internal auditors to improve our security and find flaws, often done before an external audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In our software testing we are doing, “unit testing”, what are we testing?

A

Tests that verify the functionality of a specific section of code

17
Q

Penetration Testing (Pen Testing) have very clear rules of engagement defined in a SOW (Statement Of Work)

A

Which IP ranges, time frame, tools, POC (point of contact), how to test, what to test.

18
Q

We are doing different types of audits in our organization. Who would perform a structured audit?

A

External Auditors

19
Q

Which phase could a penetration tester go to after they are finished with one of the “System browsing” phases?

A

Discovery
Install additional tools

20
Q

What could a vulnerability scan possibly help us find?

A

outdated software, missing patches and system misconfiguration

21
Q

We have hired a penetration testing company to find security flaws in our organization. They are at the enumeration phase, what are they doing?

A

scanning

22
Q

Pen testing phases

A

Planning
Reconnaissance
Scanning (enumeration)
Vulnerability assessment
Exploitation
Reporting.

23
Q

What would be the PRIMARY reason we use a specific server for storing our centralized logs, and only giving our administrators limited access?

A

to ensure the logs integrity

24
Q

We have hired a penetration tester, and she has been given partial knowledge of our organization and infrastructure. Which access level would that emulate?
A: an administrator
B: a senior executive
C: a manager
D: a normal employee

A

D: a normal employee
Explanation
Gray (Grey) box (Partial Knowledge) Pentesting: The attacker has limited knowledge; is a normal user, vendor, or someone with limited environment knowledge.

25
Q

what is the formula for RISK

A

risk = threat x vulnerability
there could be a vulnerability but if it causes no threat there there is also no risk

26
Q

if you have a vulnerability but no threat, what is your risk?

A

there is no risk if there is no threat based off that specific vulnerability.
Risk = threat X vulnerability

27
Q

what are the 5 phases for pen testing

A
  1. Discovery and Reconnaissance
  2. Scanning and probing
  3. exploitations
  4. post-exploitation
  5. reporting
28
Q

what happens during the discovery and recon phase during pen testing

A

gather information regarding the target(s)

29
Q

what happens during the scanning and probing phase during pen testing

A

utilize gathered information to probe for vulnerabilities and identify entry points

30
Q

what happens during the exploitation phase during pen testing

A

utilize approved methods to exploit vulnerabilities and attempt to gain access

31
Q

what happens during the post-exploitation phase during pen testing

A

continue the attack by attempting further exploits using the access gained

32
Q

what happens during the reporting phase of pen testing

A

document and present report on action taken, exploits achieved, suggested remediation

33
Q

what should an organization do after the report phase of a pen test

A

remediate and retest: the org should address any vulnerabilities discovered, and the pen testers repeat the test to identify if the remediation was successful

34
Q

what are synthetic transactions

A

are automated activities run against a monitored target t measure its performance.

example: for a web application, this might involve logging in with a test user account to verify if the application responds to the log request or returns data in response to queries

for DNS or DHCP, the synthetic transaction is a request for a name resolution or an IP address

Heartbeat monitoring, a detective control that identifies services that are offline or unresponsive is a synthetic transaction.