Domain 6: Security Assessment & Testing Flashcards

1
Q

What is a security audit?

A

A security audit is a test against a published standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 7 components of a security assessment?

A

Security assessments view many controls across multiple domains and may include the following:
• Policies, procedures, and other administrative controls
• Assessing the real world-effectiveness of administrative controls
• Change management
• Architectural review
• Penetration tests
• Vulnerability assessments
• Security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does SOC type 1 report on?

A

SOC 2 Type 1 report on management’s description of a service organization’s system and the suitability of the design of controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does SOC type 2 report on?

A

SOC 2 Type 2 report on management’s description of a service organization’s system and the suitability of the design and operating
effectiveness of controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens in a structured audit?

A

Structured audits (3rd party):

  • External auditors are used validate compliance, they are experts and the audit adds credibility.
  • Can also be a knowledge transfer for the organization, required annually in many organizations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 6 phases of a penetration testing?

A

Planning > Reconnaissance > Scanning (enumeration) > Vulnerability assessment > Exploitation > Reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does static testing do?

A

Static testing tests the code passively; the code is not running. This includes walkthroughs, syntax checking, and code reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does dynamic testing do?

A

Dynamic testing tests the code while executing it. With dynamic testing, security checks are performed while actually running or executing the code or application under review. Common method for closed source applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is synthetic monitoring?

A

Synthetic Transactions/monitoring - Building scripts or tools that simulate normal user activity in an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is white-box software testing?

A

White-box software testing gives the tester access to program source code, data structures, variables, etc. Black-box testing gives the tester no internal details; the software is treated as a black box that receives inputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a traceability matrix?

A

A traceability matrix, sometimes called a requirements traceability matrix (RTM), can be used to map customers’ requirements to the software testing plan; it traces the requirements and ensures that they are being met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is unit testing?

A

Unit testing: Low-level tests of software components, such as functions, procedures, or objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is installation testing?

A

Installation testing: Testing software as it is installed and first operated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is integration testing?

A

Integration testing: Testing multiple software components as they are combined into a working system. Subsets may be tested, or Big Bang integration testing is used for all integrated software components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is regression testing?

A

Regression testing: Testing software after updates, modifications, or patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is acceptance testing?

A

Acceptance testing: Testing to ensure that the software meets the customer’s operational
requirements. When this testing is done directly by the customer, it is called user acceptance testing.

17
Q

What is fuzzing?

A

Fuzzing (also called fuzz testing) is a type of black-box testing that submits random, malformed data as inputs into software programs to determine if they will crash

18
Q

What is mutation fuzzing?

A

Mutation (dumb) fuzzing – The tester analyses real info and modifies it iteratively.

19
Q

What is combinatorial software testing?

A

Combinatorial software testing is a black-box testing method that seeks to identify and test all unique combinations of software inputs

20
Q

What is misuse case testing?

A

Misuse Case Testing:
- Executing a malicious act against a system, attackers won’t do what normal users would, we need to test misuse to ensure our application or software is safe.

21
Q

What happens in an unstructured audit?

A

Internal auditors are used to improve security and find flaws, often done before an external audit

22
Q

What do we need to ensure is synchronized for our audit logs to be admissible in court?

A

The clocks of all systems in an organization should be connected to multiple synchronized NTP servers, to ensure all clocks are synchronized. If logs have another timestamp than the real time, they are not usable in a trial.

23
Q

In which form of software testing do we test the connections between the different systems and components?

A

Interface testing

24
Q

What are the 5 common problems with audit record management?

A

Audit record management typically faces five distinct problems:
Log are not reviewed on a regular and timely basis.
Audit logs and audit trails are not stored for a long enough time period.
Logs are not standardized or viewable by correlation toolsets - they are only viewable from the system being audited.
Log entries and alerts are not prioritized.
Audit records are only reviewed for the bad stuff.

25
Q

What is test coverage analysis?

A

Identifies the how much of the code was tested in relation to the entire application.

26
Q

We want penetration testers to prove they can get to our sensitive documents, but we do not want them to access any of them. What could we use for them to prove they reached their target?

A

Often a dummy file is made and it is the target they should try to reach, if they can see/access/alter the file they have been successful.

27
Q

When a penetration tester is trying to gain sensitive information from an employee with social engineering. Which type of access control type is she testing?

A

Social engineering is an attack on administrative controls, it can be mitigated with training and awareness. Administrative (Directive) Controls: Organizational Policies and Procedures. Regulation. Training and Awareness.

28
Q

Our senior leadership has decided to do a double-blind penetration test. What does that mean?

A

Double blind is closer to a real attack, the testers are black box (zero knowledge), and the network and security teams are not aware this is a pen test or when it is happening.

29
Q

What are alternative names for white box penetration testing?

A

Clear box and crystal box

30
Q

What is reduction analysis?

A

Decomposing the application, system or environment to gain a greater understanding of the logic of the product and its interactions with external elements.

31
Q

What are the four branches of forensic analysis?

A

Media analysis, network analysis, software analysis, and hardware/embedded device analysis.

32
Q

What is the zzuf tool used for?

A

Automating the process of mutation fuzzing by manipulating input according to user specifications

33
Q

What is generational fuzzing?

A

Generational (intelligent) fuzzing develops data models and creates new fuzzed input based on an understanding of the types of data used by the program

34
Q

What are the stages of Process for Attack Simulation and Threat Analysis (PASTA)?

A

Stage 1: Definition of Objectives
Stage 2: Technical Scope
Stage 3: Application Decomposition and Analysis
Stage 4: Threat Analysis
Stage 5: Weakness and Vulnerability Analysis
Stage 6: Attack Modeling & Simulation
Stage 7: Risk Analysis & Managment

35
Q

What types of logs does NIST Special Publication 800-92 suggest should be collected and audited?

A

NIST Special Publication 800-92 suggests the following log types should be collected and audited:
Network Security Software/Hardware:
Antivirus logs, IDS/IPS logs, remote access software (such as VPN logs), web proxy, vulnerability management,
authentication servers, routers and firewalls.
Operating System:
System events, audit records, applications, client requests and server responses, usage information, significant operational actions.