Domain 6- Security Assessment and Testing Flashcards
What is the difference between SSAE 16 Type 1 reports and SSAE 16 type 2 reports?
The statement on Standards for Attestation engagements document 16 (SSAE 16), “titled reporting on controls” , provides a common standard to be used by auditors performing assessments of service organizations with the intent of allowing the organization to conduct an external assessment. Type 1 rprots provide a description of controls provided by the audited organization as well as the auditor’s opinion based upon the description. Type II reprots cover a minimum 6 month time period and also include an opinion from the auditor on the effectiveness of those controls based upon actual testing performed by the auditor.
What does NIST’s Security Content Automation Protocol do?
Provides the security community with a common set of standards to provide a common language for describing and evaluating vulnerabilities. SCAP includes the following compontents
1) Common Vulnerabilites and Exposures (CVE)
2) Common Vulnerability Scoring System (CVSS)
3) Common Configuration Enumeration (CCE)
4) Common Platform Enumeration (CPE)
5) Extensible Configuration Checklist Description Format (XCCDF)
6) Open Vulnerability Assessment Language (OVAL)
Which TCP port number is FTP?
20/21
Which TCP port number is SSH?
22
Which TCP port number is Telnet?
23
Which TCP port number is SMTP?
25
Which TCP port number is DNS?
53
Which TCP port number is HTTP?
80
Which TCP port number is POP3?
110
Which TCP port number is NTP?
123
Which TCP port numbers is Windows File Sharing?
135, 137-139, 445
Which TCP port number is HTTPS?
443
Which TCP port number is LPR/LPD?
515
Which TCP port number is Microsoft SQL Server?
1433/1434
Which TCP port number is Oracle?
1521
Which TCP port number is H.323?
1720
Which TCP port number is PPTP?
1723
Which TCP port number is RDP?
3389
Which TCP port number is HP JetDirect Printing?
9100
Adam recently ran a network port scan of a web server running in his organization. He ran the scan from an external network to get an attacker's perspective on the scan. Which one of the following results in the greatest cause for alarm? A) 80/open B)22/filtered C)443/Open D) 1433/Open
D) Only open ports represent potentially significant security risks. Ports 80 and 443 are expected to be open on a web server. Port 1433 is a database port and should never be exposed to an external network.
Beth would like to run an nmap scan against all of the systems on her organization's private network. These include systems in the 10.0.0.0 private address space. She would like to scan this entire private address space because she is not certain what subnets are used.What network address should Beth specify as the target of her scan? A)10.0.0.0/0 B) 10.0.0.0/8 C) 10.0.0.0/16 D) 10.0.0.0/24
B) The use of an 8-bit subnet mask means that the first octet of the IP address represents the network address. In this case, that means 10.0.0.0/8 will scan any IP address beginning with 10.
What port is used to accept administrative connections using the SSH utility? A) 20 B) 22 C) 25 D) 80
B) SSH protocol uses port 22 to accept administrative connections to a server.
Which one of the following tests provides the most accurate and detailed information about the security state of a server? A) unauthenticated scan B) Port scan c) Half-open scan d) Authenticated sca
D) Authenticated scans can read configuration information from the target system and reduce the instances of false positive and false negative reports.
According to PCI DSS, how often must a subjected company rescan web applications?
PCI DSS requires that subjected organizations rescan applications at least annually, and after any changes in application
Which of the following is a method used to design new software tests and ensure the quality of tests? A) Code auditing B) Static code analysis C) Regression testing D) Mutation Testing
D) Mutation testing modifies a program in small ways and then tests that mutant to determine if it behaves as it should or it fails. This technique is used to design and test software tests through mutation. Static code analysis and regression testing are both means of testing code, whereas ode auditing is an analysis of source code rather than a means of designing and testing software tests.
During a port scan, Scott found TCP port 443 open on a system. Which tool is best suited to scanning the service that is most likely running on that port? A) zzuf B) Nikto C) Metasplot D) sqlmap
B) TCP port 443 normally indicates an HTTPS server, Nikto is a useful for vulnerability scanning web servers and applications and is the best choice listed for a web server. zzuf is a fuxxing tool and isn’t relevant for vulnerability scans,