Domain 6 Security Assessment and Testing Flashcards

1
Q

Which of the following would be the best reason for separating the test and development environments?

A

To control the stability of the test environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following can be defined as the process of rerunning a portion of the test scenario or test plan to ensure that changes or corrections have not introduced new errors?

A

Regression testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following statements pertaining to software testing approaches is correct?

A

The test plan and results should be retained as part of the system’s permanent documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

There are several types of penetration tests depending upon the scope, objective and nature of a test. Which of the following describes a penetration test where you attack and attempt to circumvent the controls of the targeted network from the outside, usually the Internet?

A

External Testing

For the CISA exam you should know penetration test types listed below:

External Testing - Refers to attack and control circumvention attempts on a target’s network perimeter from outside the target’s system, usually the Internet
Internal Testing – Refers to attack and control circumvention attempt on target from within the perimeter. The objective is to identify what would occur if the external perimeter was successfully compromised and/or an authorized user from within the network wanted to compromise security of a specific resource on a network.
Blind Testing - Refers to the condition of testing when the penetration tester is provided with limited or no knowledge of the target’s information systems. Such testing is expensive, since penetration tester have to research the target and profile it based on publicly available information.
Double Blind Testing - It is a extension of blind testing, since the administrator and security staff at the target are also not aware of test. Such a testing can effectively evaluate the incident handling and response capability of the target and how well managed the environment is.
Targeted Testing – Refers to attack and control circumvention attempts on the target, while both the target’s IT team and penetration tester are aware of the testing activities. Penetration testers are provided with information related to target and network design. Additionally, they are also provided with a limited privilege user account to be used as a starting point to identify privilege escalation possibilities in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following statement correctly describes the difference between black box testing and white box testing?

A

The correct answer is: Black box testing focuses on functional operative effectiveness where as white box assesses the effectiveness of software program logic

For your exam you should know below mentioned types of testing

Alpha and Beta Testing - An alpha version is early version is an early version of the application system submitted to the internal user for testing. The alpha version may not contain all the features planned for the final version. Typically software goes to two stages testing before it consider finished.The first stage is called alpha testing is often performed only by the user within the organization developing the software. The second stage is called beta testing, a form of user acceptance testing, generally involves a limited number of external users. Beta testing is the last stage of testing, and normally involves real world exposure, sending the beta version of the product to independent beta test sites or offering it free to interested user.
Pilot Testing - A preliminary test that focuses on specific and predefined aspect of a system. It is not meant to replace other testing methods, but rather to provide a limited evaluation of the system. Proof of concept are early pilot tests – usually over interim platform and with only basic functionalities.
White box testing - Assess the effectiveness of a software program logic. Specifically, test data are used in determining procedural accuracy or conditions of a program’s specific logic path. However testing all possible logical path in large information system is not feasible and would be cost prohibitive, and therefore is used on selective basis only.
Black Box Testing - An integrity based form of testing associated with testing components of an information system’s “functional” operating effectiveness without regards to any specific internal program structure. Applicable to integration and user acceptance testing.
Function/validation testing – It is similar to system testing but it is often used to test the functionality of the system against the detailed requirements to ensure that the software that has been built is traceable to customer requirements.
Regression Testing - The process of rerunning a portion of a test scenario or test plan to ensure that changes or corrections have not introduced new errors. The data used in regression testing should be same as original data.
Parallel Testing - This is the process of feeding test data into two systems – the modified system and an alternative system and comparing the result.
Sociability Testing - The purpose of these tests is to confirm that new or modified system can operate in its target environment without adversely impacting existing system. This should cover not only platform that will perform primary application processing and interface with other system but , in a client server and web development, changes to the desktop environment. Multiple application may run on the users desktop, potentially simultaneously , so it is important to test the impact of installing new dynamic link libraries (DLLs ) , making operating system registry or configuration file modification, and possibly extra memory utilization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Once a penetration tester has gained a basic account on the system, what is his next step?

A

Escalate privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In regards to testing of Software, which of the following is an advantage in using a bottom-up versus a top-down approach to software testing?

A

Errors in critical modules are detected earlier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following test makes sure the modified or new system includes appropriate access controls and does not introduce any security holes that might compromise other systems?

A

Security testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The server has been built, locked down, patched and scanned for baseline security and there’s another step you want to take to actively ensure it is resistant to attack and the controls are performing as they should.

What could it be?

A

Penetration Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a penetration test where the penetration tester is provided with limited or no knowledge of the target system(s)?

A

Blind Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the process of feeding test data into two systems – the modified system and alternative system and comparing the result?

A

Parallel Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What would a significant benefit be from conducting an unannounced penetration test?

A

The pen test would be a more realistic analysis of the target network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One risk of being a penetration tester and security analyst is liability when things go wrong and something is damaged. What is a primary defense against such liability?

A

Insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

zero-knowledge (also called black box) test is “blind”;

.

A

the penetration tester begins with no external or trusted information, and begins the attack with public information only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A full-knowledge test (also called crystal-box)

A

provides internal information to the penetration tester, including network diagrams, policies and procedures, and sometimes reports from previous penetration testers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Audit

A

A security audit is a test against a published standard.

ie; Organizations may be audited for PCI-DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Security Assessments

A

Security assessments are a holistic approach to assessing the effectiveness of access control.

Security assessments view many controls across multiple domains, and may include the following:
• Policies, procedures, and other administrative controls
• Assessing the real world-effectiveness of administrative controls
• Change management
• Architectural review
• Penetration tests
• Vulnerability assessments
• Security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Static testing

A

tests the code passively; the code is not running.

This includes walkthroughs, syntax checking, and code reviews. Static analysis tools review the raw source code itself looking for evidence of known insecure practices, functions, libraries, or other characteristics having been used in the source code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic testing

A

tests the code while executing it. With dynamic testing, security checks are performed while actually running or executing the code or application under review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

White box software testing

A

gives the tester access to program source code, data structures, variables, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Black box testing

A

gives the tester no internal details: the software is treated as a black box that receives inputs.

22
Q

Synthetic transactions

A

or synthetic monitoring, involves building scripts or tools that simulate activities normally performed in an application.

Can establish expected norms for the performance of these transactions. These synthetic transactions can be automated to run on a periodic basis to ensure the application is still performing as expected.

23
Q

Software Testing Levels

A

Unit Testing, Installation Testing, Integration Testing, Regression Testing, and Acceptance Testing

24
Q

Unit Testing:

A

Low-level tests of software components, such as functions, procedures or objects

25
Q

Installation Testing:

A

Testing software as it is installed and first operated

26
Q

Integration Testing:

A

Testing multiple software components as they are combined into a working system. Subsets may be tested, or Big Bang integration testing tests all integrated software components

27
Q

Regression Testing:

A

Testing software after updates, modifications, or patches

28
Q

Acceptance Testing:

A

testing to ensure the software meets the customer’s operational requirements. When this testing is done directly by the customer, it is called User Acceptance Testing.

29
Q

Fuzzing (also called fuzz testing)

A

is a type of black box testing that submits random, malformed data as inputs into software programs to determine if they will crash.

30
Q

Combinatorial software testing

A

is a black-box testing method that seeks to identify and test all unique combinations of software inputs.

31
Q

Misuse Case Testing

A

The idea of misuse case testing is to formally model, again most likely using UML, how security impact could be realized by an adversary abusing the application.

32
Q

Test or code coverage analysis

A

attempts to identify the degree to which code testing applies to the entire application. The goal is to ensure there are no significant gaps where a lack of testing could allow for bugs or security issues to be present that otherwise should have been discovered.

33
Q

Interface Testing

A

Traditional interface testing within applications is primarily concerned with appropriate functionality being exposed across all the ways users can interact with the application.

34
Q

Which software testing level tests software after updates, modifications, or patches?

A

Regression testing

35
Q

What is a type of testing that submits random malformed data as inputs into software programs to determine if they will crash?

A

Fuzzing

36
Q

What type of software testing tests code passively?

A

Static testing

37
Q

What term describes a black-box testing method that seeks to identify and test all unique combinations of software inputs?

A

Combinatorial software testing

38
Q

What term describes a holistic approach for determining the effectiveness of access control, and has a broad scope?

A

Security assessment

39
Q

What type of penetration test will result in the most efficient use of time and hourly consultant expenses?

A

Full knowledge

40
Q

Syslog characteristics

A

Uses UDP
Data is in Plaintext
Easily spoofed

41
Q

A network-based vulnerability assessment is a type of test also referred to as:

A

An active vulnerability assessment.

PASSIVE: You don’t send any packet or interact with the remote target. You make use of public database and other techniques to gather information about your target.

ACTIVE: You do send packets to your target, you attempt to stimulate response which will help you in gathering information about hosts that are alive, services runnings, port state, and more.

42
Q

Which of the following answers best describes the type of penetration testing where the analyst has full knowledge of the network to perform a test?

A

White-Box Penetration Testing

In general there are three ways a pen tester can test a target system.

  • White-Box: The tester has full access and is testing from inside the system.
  • Gray-Box: The tester has some knowledge of the system he’s testing.
  • Black-Box: The tester has no knowledge of the system.
43
Q

When you look at the results of one particular system, you see a few ports open on the system.
What is it that you are seeing in the nmap scan results of the remote system?

Why would these scan results appeal to a hacker?

A

Services being offered on the remote system

44
Q

Which of the following is the process of repeating a portion of a test scenario or test plan to ensure that changes in information system have not introduced any errors?

A

Regression Testing

45
Q

Which of the following statement correctly describes the difference between black box testing and white box testing?

A

Black box testing focuses on functional operative effectiveness where as white box assesses the effectiveness of software program logic

46
Q

Which of the following answers best describes the type of penetration testing where the analyst has no knowledge of the network on which he is working?

A

Black-Box Penetration Testing

47
Q

BLACK BOX TESTING

A

also known as Behavioral Testing, is a software testing method in which the internal structure/design/implementation of the item being tested is not known to the tester. These tests can be functional or non-functional, though usually functional.

48
Q

Black box penetration testing

A

the penetration tester has no previous information about the target system.

49
Q

White box penetration testing, also known as clear box testing or glass box testing

A

penetration testing approach that uses the knowledge of the internals of the target system to elaborate the test cases.

50
Q

White Box Testing

A

White box testing is the software testing method in which internal structure is being known to tester who is going to test the software.

This type of testing is carried out by software developers.

51
Q

__________ is a hardware or software test that evaluates the connection of two or more components that pass information from one area to another.

A

Interface testing

52
Q

What would a significant benefit be from conducting an unannounced penetration test?

A

The pen test would be a more realistic analysis of the target network