Lesson 1- Scoping Organizational/Customer Requirement Flashcards

1
Q

What is the name of the Standard that requires a Report on Compliance (RoC)

A

Payment Card Industry Data Security Standard
PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True of False - Level 1 and Level 2 Merchants require a RoC?

A

True
Level 1 must have an external auditor perform the assessment by an approve assessor (QSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What state enacted the Stop Hacks and Improve Electronic Data Security also known as SHIELD

A

New York

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Special Publications of NIST Focus on Cybersecurity and what specific one is for Information Security and Testing

A

SP 800 Series
SP 800-115

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which framework provides a holistic structure approach to Penetration Testing

A

Open-Source Security Testing Methodology Manual - OSSTMM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Penetration Testing Framework provides technical guidance

A

Information Security Assessment Framework (ISSAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Penetration Standard consists of 7 Main sections and approaches the standard business impact?

A

Penetration Testing Execution Standard (PTES)

Pre-Engagement Interactions
Intelligence Gathering
Threat Modeling
Vulnerability Analysis
Exploitation
Post Exploitation
Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the tool that provides techniques specific to PenTesting and what organization provides this

A

Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)

from MITRE Corp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main goal of a Penetration Test

A

Identifying and mitigating vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the name of the system that rates the severity of vulnerabilities

A

Common Vulnerability Scoring System (CVSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the scheme for identifying vulnerabilities developed my MITRE and adopted by NIST. What is fed into this?

A

Common Vulnerabilities and Exposure (CVE)

Information from CVSS is fed into CVE.

National Vulnerability Database is superset of the CVE Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the dictionary of software-related vulnerabilities maintained by MITRE called

A

Common Weakness Enumeration (CWE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly