IS3230 CHAPTER 14 Flashcards
The use of software to control the execution of a test suite is called ___.
AUTOMATED TESTING
A hole in system or network security placed deliberately either by system designers or attackers and also a way of quickly bypassing normal security measures is called ___.
BACKDOOR
In a penetration test, the ___ consists of IT staff who defend against the penetration testers. They are generally aware that a penetration test is happening but do not know what methods the penetration testers will user.
BLUE TEAM
The outermost extremes of test conditions is called ___.
BOUNDARY CONDITIONS
An industry mailing list provided by Symantec that reports new vulnerabilities as they are discovered is called ___.
BUGTRAQ
An attack in which malicious code is introduced into an application. This type of attack is possible because of lax input validation in the target application and is called ___.
CODE INJECTIONS
A document that defines every data element and database table in a piece of software is called ___.
DATA DICTIONARY
.The process of identifying the difference between reality–the current state of an organization’s IT infrastructure–and the organization’s security goals is called ___.
GAP ANALYSIS
The authorization memo, signed by a member of upper management, that states that a penetration test has been authorized and exactly what methods the test will include. Every member of a penetration testing team should carry a copy of this memo at all time to avoid misunderstandings with security and law enforcement and is called ___.
GET OUT OF JAIL FREE CARD
The process by which vulnerabilities are addressed to create a secure system is called ___.
HARDENING
The process of scanning the network to find out which Internet Protocol (IP) addresses are attached to interesting resources is called ___.
HOST DISCOVERY
The process of testing how individual components function together as a complete system is called ___.
INTEGRATION TESTING
Security testing methods that expo it possible vulnerabilities in order to prove their existence and potential impact is called ___.
INTRUSIVE TESTING METHODS
A way of measuring how software will perform with an average number of user, as well as how it will perform under extreme load conditions is called ___.
LOAD TESTING
A proprietary security scanner developed by Tenable Network Security. It is network-centric with Web-based consoles and a central server is called ___.
NESSUS