Domain 6 - Security Assessment and Testing Flashcards

1
Q

2011 CWE/SANS Top 25 Most Dangerous Software Errors

A

A list of the most widespread and critical errors that can lead to serious vulnerabilities in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Audit Records

A

Contain security event information such as successful and failed authentication attempts, file accesses, security policy changes, account changes, and use of privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Architecture Security Reviews

A

A manual review of the product architecture to ensure that it fulfills the necessary security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Automated Vulnerability Scanners

A

Tests an application for the use of system components or configurations that are known to be insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Condition Coverage

A

This criteria requires sufficient test cases for each condition in a program decision to take on all possible outcomes at least once. It differs from branch coverage only when multiple conditions must be evaluated to reach a decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Flow Coverage

A

This criteria requires sufficient test cases for each feasible data flow to be executed at least once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Decision (Branch) Coverage

A

Considered to be a minimum level of coverage for most software products, but decision coverage alone is insufficient for high-integrity applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information Security Continuous Monitoring (ISCM)

A

Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intrusion Detection Systems (IDS)

A

Real-time monitoring of events as they happen in a computer system or network, using audit trail records and network traffic and analyzing events to detect potential intrusion attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intrusion Prevention Systems (IPS)

A

Any hardware or software mechanism that has the ability to detect and stop attacks in progress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Loop Coverage

A

This criteria requires sufficient test cases for all program loops to be executed for zero, one, two, and many iterations covering initialization, typical running, and termination (boundary) conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Misuse Case

A

A Use Case from the point of view of an Actor hostile to the system under design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multi-Condition Coverage

A

This criteria requires sufficient test cases to exercise all possible combinations of conditions in a program decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Negative Testing

A

Ensures the application can gracefully handle invalid input or unexpected user behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Path Coverage

A

This criteria requires sufficient test cases for each feasible path, basis path, etc., from start to exit of a defined program segment, to be executed at least once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Positive Testing

A

Determines that your application works as expected.

17
Q

Real User Monitoring (RUM)

A

An approach to web monitoring that aims to capture and analyze every transaction of every user of a website or application.

18
Q

Regression Analysis

A

The determination of the impact of a change based on review of the relevant documentation.

19
Q

Security Log Management

A

The process for generating, transmitting, storing, analyzing, and disposing of computer security log data.

20
Q

Statement Coverage

A

This criteria requires sufficient test cases for each program statement to be executed at least once; however, its achievement is insufficient to provide confidence in a software product’s behavior.

21
Q

Static Source Code Analysis (SAST)

A

Analysis of the application source code for finding vulnerabilities without actually executing the application.

22
Q

Synthetic Performance Monitoring

A

Involves having external agents run scripted transactions against a web application.

23
Q

System Events

A

Operational actions performed by OS components, such as shutting down the system or starting a service.

24
Q

Threat Modeling

A

A process by which developers can understand security threats to a system, determine risks from those threats, and establish appropriate mitigations.

25
Q

Use Cases

A

Abstract episodes of interaction between a system and its environment.

26
Q

Validation

A

The determination of the correctness, with respect to the user needs and requirements, of the final program or software produced from a development project.

27
Q

Verification

A

The authentication process by which the biometric system matches a captured biometric against the person’s stored template.

28
Q

Vulnerability Management Software

A

Log the patch installation history and vulnerability status of each host, which includes known vulnerabilities and missing software updates.

29
Q

Web Proxies

A

Intermediate hosts through which websites are accessed.

30
Q

White-box Testing

A

A design that allows one to peek inside the “box” and focuses specifically on using internal knowledge of the software to guide the selection of test data.