Domain 6 - Security Assessment and Testing Flashcards

1
Q

Verifies that a control is function properly

A

Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Comprehensive review of the security of a system, application and/or environment.

A

Security Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provides objective evidence that the design outputs of a particular phase of the software development life cycle meet all of the specified requirements for that phase.

A

Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Developing a level of confidence that the software or system meets all requirements and user expectations as documented.

A

Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security and Privacy Controls for federal information systems and organizations

A

NIST SP 800-53A R4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Determine which type of AUDIT the following represents:

Performed by a team from within the organization, usually meant for internal consumption.

A

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determine which type of AUDIT the following represents:

Performed by an outside auditing firm not connected with the organization

A

External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Determine which type of AUDIT the following represents:

Conducted by and/or on behalf of another organization, such as a regulatory body

A

Third-Party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security assessment performed by independent auditors

A

Security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of audit is defined:

High level review of documentation and controls. Randomly sampling controls to verify the validity of those controls.

A

Type 1 Report

DOCUMENTATION WITH RANDOM SAMPLING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of audit is defined:

Testing the controls with 6 months worth of data. Auditor supplies opinion of effectiveness upon test

A

Type 2 Report

MORE TECHNICAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What reports are generated after an audit?

A

SOC1 , SOC2 and SOC3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which Report is defined:

Report on controls at a Service Organization which are relevant to user entities internal control over financial reporting. Can be Type 1 or 2

Focused on financial reporting controls

A

SOC1

Just Finance !!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which Report is defined:

Performed in accordance with AT-C and based upon the Trust Services Criteria, with the ability to test and report on the design and operating effectiveness of a service orgs controls.

Focuses on a business non financial reporting controls as the relate to security, availability, processing integrity, confidentiality, and privacy of a system. Can be Type 1 or 2

A

SOC2

Finance + Security !!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which Report is defined:

Can only be done as a Type 1 report.

A

SOC3

Generic Scrubbed publicly available version of a SOC2 report with no internal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify the Process:

criteria relevant to how an entity identifies the need for changes, makes the changes using a controlled change management process, and prevents unauthorized changes from being made.

A

Change Management

17
Q

Another term for WEAKNESS within the organization

A

Vulnerability

18
Q

When scanning, which scan is the “noisiest” and would bring the most attention or set off alarms?

A

XMAS Scan

19
Q

Uses a single packet sent to each scanned port with the SYN flag set, indicating a request to establish connectivity and begin the TCP three way handshake.

A

TCP SYN Scan

20
Q

Opens a full connection to the target on a specified port. Used when sender does not have permission to run a TCP SYN Scan

A

TCP Connect scan

21
Q

Sends a packet with the ACK flag set to target. Used to probe firewall rules

A

TCP ACK Scan

22
Q

Sends a packet with the FIN, PSH, & URG flags set

A

XMAS Scan

23
Q

What are the three port status’es returned by NMAP?

A
  1. Open
  2. Closed
  3. Filtered
24
Q
  1. Planning
  2. Recon
  3. Vulnerability Scanning
  4. Exploitation
  5. Reporting
A

Five phases of pen-testing

25
Q

Reviewing code without running it

A

Static testing

26
Q

Executing software in a runtime environment to see what it does

A

Dynamic Testing

27
Q

Specialized form of dynamic testing that uses randomized inputs to stress a system looking for unexpected outcomes. There are two types:

  1. Mutation (dumb)
  2. Generational (intelligent)
A

Fuzz testing

28
Q

Assessing the performance of modules against the interface specifications to ensure the proper operations. Three types:

a Application Programming Interface
b User Interface
c Physical Interface

A

Interface Testing

29
Q

Estimation of the degree of testing conducted against the system

                         Number of use cases Test Coverage = -------------------------------
                         Total number of cases
A

Test Coverage Analysis