Domain 6 (Security Assessment and Testing) Flashcards

1
Q

What is the difference between a Vulnerability Assessment and a Penetration Test?

A

Vulnerability Assessment identifies weaknesses and Penetration Testing validates the discovered weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main issue with Penetration Testing?

A

It can be disruptive to productivity and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does separation of duties relate to Penetration Testing?

A

Tester should only test effectiveness of safegaurds NOT suggest remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What document do you need before starting Penetration Test?

A

Rules of Engagement document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three types of Penetration Testing?

A

Physical, Administrative (Social Engineering) and Logical (System attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of an Intrusion Detection System (IDS)?

A

Identifies suspicious activity, logs, alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What interface mode is required for an Intrusion Detection System (IDS)?

A

Promiscuous mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you need on a switch for an Intrusion Detection System (IDS) to work?

A

Port Mirroring/Spanning (Because switches isolates traffic to single ports)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between a Host Based Intrusion Detection System (HIDS) and a Network Intrusion Detection System (NIDS)?

A

HIDS only covers a single host, and NIDS covers a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Advantages of HIDS

A

Can look at data after is decrypted (network traffic is encrypted). Can monitor OS or a single App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disadvantages of HIDS

A

System resource usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disadvantage of NIDS

A

Can’t view unencrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name two types of IDS analysis engines

A

Pattern Matching (Signatures) and Profile Matching (Behaviour, Heuristics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a collection of Honey Pots called?

A

A honey net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Main concern about Honey Pots

A

Careful of Enticement vs Entrapment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly