Domain 6: Security Assessment and Testing Flashcards

1
Q

What are the three major component s of a security assessment program?

A

Security Tests, Security Assessments, Security Audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do security tests do?

A

Verify that a control is functioning properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are security assessments?

A

comprehensive reviews of the security of a system, application, or other environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do security audits do?

A

evaluations performed with the purpose of demonstrating the effectiveness of controls to a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three main categories of vulnerability scans

A

network discovery scans, network vulnerability scans, and web application vulnerability scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Activity Scanning

A

scan a range of IP addresses searching for open network ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP SYN Scanning

A

sends a single packet to each scanned port with a SYN flag set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP Connect Scanning

A

opens a full connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP ACK Scanning

A

sends a ACK flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XMAS Scanning

A

sends FIN, PSH, and URG flags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

False Positive

A

reports a vulnerability when one does not exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

False Negative

A

fails to report a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTP Port

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH Port

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Telent

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMTP

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS

A

53

18
Q

HTTP

A

80

19
Q

POP3

A

110

20
Q

NTP

A

123

21
Q

HTTPS

A

443

22
Q

MS SQL Server

A

1433

23
Q

Oracle

A

1521

24
Q

H.323

A

1720

25
Q

PPTP

A

1723

26
Q

RDP

A

3389

27
Q

Penetration Testing

A

attempts to exploit systems

28
Q

White Box Pen Testing

A

attackers have detailed information

29
Q

Black Box Pen Testing

A

attackers have no info

30
Q

Gray Box Pen Testing

A

attackers have partial knowledge

31
Q

Fagan Code Review 6 steps

A

Planning, Overview, Preparation, Inspection, Rework, and Follow up

32
Q

Static Testing

A

evaluates code without running it

33
Q

Dynamic Testing

A

evaluates code in a runtime environment

34
Q

Fuzz Testing

A

provides many different types of input to software to stress its limits

35
Q

Mutation (Dumb) Fuzzing

A

takes previous input, manipulates it, to create fuzzed input

36
Q

Generational (Intelligent) Fuzzing

A

develops data models and creates new fuzzed inputs

37
Q

Interface Testing

A

assess the performance of modules against the interface specs

38
Q

Application Programming Interfaces - APIs

A

standardized way for code to interact and be exposed to the outside world

39
Q

Three types of interfaces to test during SW testing

A

APIs, UIs, and Physical Interfaces

40
Q

User Interfaces (UIs)

A

GUIs and command line interfaces, provide end users with the ability to interact with the software

41
Q

Physical Interfaces

A

exist in apps that manipulate machinery, logic controllers and other objects in the physical world

42
Q

Test Coverage Analysis

A

estimate degree of testing conducted against new sw