Domain 6 -Security Assessment and Testing Flashcards

1
Q

Network attacks may leverage

A

client-side attacks, server-side attacks, or Web application attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security audit

A

is a test against a published standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security assessment

A

may include other distinct tests, such as penetration tests. The goal is to broadly cover many other specific tests, to ensure that all aspects of access control are considered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Synthetic transactions

A

involves building scripts or tools that simulate activities normally performed in an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unit Testing

A

tests of software components, such as functions, procedures or objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Installation Testing

A

Testing software as it is installed and first operated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Integration Testing

A

Testing multiple software components as they are combined into a working system. Subsets may be tested, or Big Bang integration testing tests all integrated software components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Regression Testing:

A

Testing software after updates, modifications, or patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acceptance Testing

A

testing to ensure the software meets the customer’s operational requirements. When this testing is done directly by the customer, it is called User Acceptance Testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Combinatorial software testing

A

is a black-box testing method that seeks to identify and test all unique combinations of software inputs. An example of combinatorial software testing is pairwise testing (also called all pairs testing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Misuse Case Testing

A

formally model, again most likely using UML, how security impact could be realized by an adversary abusing the application. This can be seen simply as a different type of use case, but the reason for calling out misuse case testing specifically is to highlight the general lack of considering attacks against the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Test or code coverage analysis

A

attempts to identify the degree to which code testing applies to the entire application. The goal is to ensure there are no significant gaps where a lack of testing could allow for bugs or security issues to be present that otherwise should have been discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Interface Testing

A

Traditional interface testing within applications is primarily concerned with appropriate functionality being exposed across all the ways users can interact with the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

misuse case

A

whether an intentional misuse of them could result in an error that subverts the confidentiality, integrity, and availability of the data the app provides access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Second-party audits

A

are typically performed by external parties, in order to give business partners the assurance that the entity being audited is living up to the terms of contractual agreements between the two with respect to due care and due diligence in the handling of the business partner’s assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Third-party audits

A

are commonly performed as part of an entity’s requirements to satisfy regulatory compliance with respect to systems processing information deemed to be in the public interest.

17
Q

tabletop exercises (TTXs)

A

is to examine existing controls and response procedures to the manifestation of a likely threat, to ensure that everyone who would be involved knows their role and that the resulting outcome across multiple contingencies would be what is desired. Branches in activities are typically explored to some degree, based on cascading dependencies, as well as sequels to the scenario under discussion.

18
Q

Checklist test

A

copies of the disaster recovery or business continuity procedures are distributed to all stakeholders for review, in order to ensure that no necessary materials or steps are omitted.