IS3445 CHAP 12 PERFORMING A WEB SITE VULNERABILITY AND SECURITY ASSESSMENT Flashcards
___ is identifying the types of services components that are running on a system.
Enumeration
___ is identifying the type and version of operating system that is running on a system.
Fingerprinting
___ is an attempt to circumvent various layers of a system or application’s security controls for the purpose of seeing how far into the system the attacker can get.
Penetration testing
___ is the act of sending TCPIP packets to various IP addresses and determining which of those addresses are active based on the responses that are received.
Ping sweep
- The “percentage of vulnerabilities not found” metric is a useful way of reporting assessment data.
TRUE OR FALSE
FALSE
- How many tiers are commonly used for Web sites?
- 2
- 1
- 3
- 4
3
- The act of fixing vulnerabilities or findings resulting from an assessment is known as ____.
Remediation
- Which of the following activities are considered parts of a Web server OS assessment? (Select two)
- Identifying the source code author
- Identifying the patches and updates that have been installed
- Identifying the services and ports that are active
- Identifying the databases that are running
Identifying the patches and updates that have been installed
Identifying the services and ports that are active
- Ping sweeps are a part of what process?
- Code review
- Discovery
- Attack vectors
- Remediation
Discovery
- Web site forms and user input fields are often attacked using cross-site scripting.
TRUE OR FALSE
TRUE
- Which section of the assessment report is intended to be a high-level briefing of the findings?
- Summary of findings
- Vulnerability findings
- Recommendations
- Executive summary
Executive summary
- An in-depth security assessment of a Web server application includes performing which of the following?
- Error-based code compiling
- OS patching
- A source code review
- TCP/IP routing
A source code review
- SQL ___ is an attempt to manipulate a database by inserting commands into a field or URL.
Injection
- Nmap’s primary features include which of the following? (Select three)
- Password cracking
- OS fingerprinting
- Port scanning
- Code analysis
- Ping sweeps
OS fingerprinting
Port scanning
Ping sweeps
- What is the purpose of exploiting a vulnerability or fall in a system to gain access to resources not otherwise available to the attacker or tester?
- Acceleration
- Enumeration
- Privilege escalation
- Field injection
Privilege escalation