Domain 6: (Security Assessment and Testing) Flashcards

1
Q

What are some tools of security assessment and testing programs for validating security controls?

A

Vulnerability Assessments
Penetration tests, Software testing
Audits
Security Management Tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What uses automated tools to search for known vulnerabilities in systems, apps, and networks?

A

Vulnerability Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What uses the same tools as vulnerability assessment systems but supplements them with attack techniques where an assessor attempts to exploit vulnerabilities and gain access to the sys.

A

Penetration Tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some penetration testing strategies?

A

War Dialing
Sniffing
Eavesdropping
Dumpster Diving
Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What describes techniques to verify that code functions as designed and does not contain security flaws?

A

Software Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What uses a peer review process to formally or informally validate code before deploying it in production?

A

Code Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What assesses the interactions between components and users with API testing, user interface testing, and physical interface testing?

A

Interface Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What technique includes code reviews, and evaluates the security of software without running it by analyzing either the source code or the compiled app?

A

Static Software Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What technique evaluates the security of software in a runtime environment and is often the only option for orgs deploying apps written by someone else?

A

Dynamic Software Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What uses modified inputs to test software performance, modifies known inputs to generate synthetic inputs that may trigger unexpected behavior, and develops inputs based on models of expected inputs to perform same tasks?

A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some security management oversight techniques?

A

Log Reviews
Account Management Reviews
Backup Verification
Key Performance and Risk Indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly