Domain 6 (Security Assessment and Testing) Flashcards
What is the difference between a Vulnerability Assessment and a Penetration Test?
Vulnerability Assessment identifies weaknesses and Penetration Testing validates the discovered weaknesses
What is the main issue with Penetration Testing?
It can be disruptive to productivity and systems
How does separation of duties relate to Penetration Testing?
Tester should only test effectiveness of safegaurds NOT suggest remediation
What document do you need before starting Penetration Test?
Rules of Engagement document
What are the three types of Penetration Testing?
Physical, Administrative (Social Engineering) and Logical (System attacks)
What is the purpose of an Intrusion Detection System (IDS)?
Identifies suspicious activity, logs, alerts
What interface mode is required for an Intrusion Detection System (IDS)?
Promiscuous mode
What do you need on a switch for an Intrusion Detection System (IDS) to work?
Port Mirroring/Spanning (Because switches isolates traffic to single ports)
What is the difference between a Host Based Intrusion Detection System (HIDS) and a Network Intrusion Detection System (NIDS)?
HIDS only covers a single host, and NIDS covers a network
Advantages of HIDS
Can look at data after is decrypted (network traffic is encrypted). Can monitor OS or a single App
Disadvantages of HIDS
System resource usage
Disadvantage of NIDS
Can’t view unencrypted data
Name two types of IDS analysis engines
Pattern Matching (Signatures) and Profile Matching (Behaviour, Heuristics)
What is a collection of Honey Pots called?
A honey net
Main concern about Honey Pots
Careful of Enticement vs Entrapment