IS3445 CHAP 15 WEB APPLICATION SECURITY ORGANIZATIONS, EDUCATION, TRAINING, AND CERTIFICATION Flashcards
___ are now normally higher level coordination bodies with wider responsibilities for vulnerability and attack research and issuing warning and vulnerability notices.
(CIRT) Computer incident response team
___ is an all hours or on call group for an organization, corporation, or country designed to respond to online attacks or similar events. May also be called ISIRT.
(CSIRT) Computer security incident response team
___ is the basic description of computer application and operating system vulnerability; run for the Department of Homeland Security by the MITRE Corporation.
(CVE) Common Vulnerabilities and Exposures list
___ is a regularly updated US federal government project that sets a minimum security configuration for Microsoft Windows XP and Windows Vista computers that are used as general-purpose desktops.
(FDCC) Federal Desktop Core Configuration
___ is a worldwide voluntary and collaborative body bringing together incident response teams and related organizations. It encourages rapid and secure communications between affected communities and allows in-confidence information sharing.
(FIRST) Forum of Incident Response and Security Teams
___ is a carefully monitored system set up by security professionals to be attacked, so that attack sources and methods can be analyzed.
Honeypot
___ is a nonprofit professional and certification body that provides related programs for information security professionals.
(ISC)2 International Information Systems Security Certification Consortium
___ is the international standard for accrediting schemes that certify personal competences.
ISO 17024
___ is a copyright or licensing system that, compared with conventional commercial licensing schemes, allows wide use and modification of the material.
Open source
- Which organization provides incident response support for the federal government?
- OWASP
- The Secret Service
- US-CERT
- FIRST
US-CERT
- Which organizations investigate Internet crime?
- MLATs
- IC3
- ECTFs
- OWASP
IC3
ECTFs
- Which of the following standards are governed by NIST? (Select two)
- Advanced Encryption Standard (AES)
- ISO 27001
- Federal Desktop Core Configuration
- CISSP
Advanced Encryption Standard (AES)
Federal Desktop Core Configuration
- which of the following are (ISC)2 qualifications? (Select three)
- CISM
- CISSP
- CISSP-ISSEP
- Security+
- CSSLP
CISSP
CISSP-ISSEP
CSSLP
- You must pass an exam to become an (ISC)2 associate.
TRUE OR FALSE
TRUE
- Which certification organization is not approved under DiD Directive 8750?
- CERT/CC
- ISACA
- SANS GIAC
- FLETC
FLETC
- What is the purpose of open proxy honest in relation to Internet-based Web attacks?
- Silently record for later analysis
- Act as deliberate weakened targets for
- Obscure the source of
- Detect and terminate
Silently record for later analysis
- Roughly how many site reviews were used to generate the most recent WASC Web Security Report?
- 5,000
- 10,000
- 20,000
- 100,000
10,000
- ISO 17024 is the international standard for which of the following?
- Information security management systems
- Web application penetration testing
- Evaluation criteria for IT security
- Certification programs for personal competence
Certification programs for personal competence
- The National Institute of Standards and Technology (NIST) represents the US int he International Standards Organization.
TRUE OR FALSE
FALSE