Procedures/Methodology Flashcards

1
Q

What is the widely-adopted, peer-reviewed manual for operational security testing and analysis?

A

OSSTMM (Open Source Security Testing Methodology Manual)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what type of attack does the attacker craft an XML message with very large payloads, recursive content, excessive nesting, malicious external entities, or with malicious DTDs (Data Type Documents)?

A

XML denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which attacks can be mitigated by time stamps and nonce?

A

Replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What organization has as its official mission to promote U.S. innovation and industrial competitiveness?

A

National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In which phase of Software Assurance Maturity Model do you execute a formal contract that guarantees non-disclosure of the client’s data and legal protection for the tester?

A

Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the CERT?

A

The Computer emergency response teams (CERT) are expert groups that handle computer security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Other than Preparation and Conclusion, what is the third phase of the Software Assurance Maturity Model?

A

Conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two functions of key escrow?

A

To recover keys in the event the original keys are lost or deleted, and to provide access to the data to other third parties, such as law enforcement investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the term for placing copies of private keys used to encrypt data in the safekeeping of a third party organization?

A

Key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of integrity hashes?

A

To verify that files have not been changed or altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the term for any method used to bypass multi-level security solutions?

A

Covert channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the name of the online community dedicated to web application security, known for their top 10 list of web vulnerabilities?

A

Open Web Application Security Project (OWASP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the term for hiding messages or information within other non-secret text or data?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why should you reduce the amount of information provided in error messages?

A

To prevent information leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of penetration test requires the tester to have only limited knowledge of the target system(s)

A

Gray box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What organization acts as a single point of contact for reporting security incidents in the US?

A

U.S. Computer Security Incident Response Team (CSIRT)

17
Q

In what scenarios should end-to-end security mechanisms like XMLEncryption, XMLSignature, and SAML assertions be used?

A

Where messages are routed through multiple intermediaries

18
Q

Which type of penetration test requires the test to have no knowledge of the target system(s)?

A

Black box

19
Q

In which phase of Software Assurance Maturity Model do you advise corrective action?

A

Conclusion

20
Q

Which type of penetration test requires the test to have complete knowledge of the target system(s)?

A

White box

21
Q

What is the term for a design with a front-end server, an application server, and a database server that as a group perform a single and unique role?

A

N-tier

22
Q

What are three mitigations to a XML DoS attack?

A

XML filters, XML gateways, and ensuring a robust XML parser

23
Q

In which phase of Software Assurance Maturity Model does the tester look for potential vulnerabilities?

A

Conduct

24
Q

What class of vulnerability is an XML denial of service attack?

A

Service oriented architecture (SOA) vulnerability