Procedures/Methodology Flashcards
What is the widely-adopted, peer-reviewed manual for operational security testing and analysis?
OSSTMM (Open Source Security Testing Methodology Manual)
In what type of attack does the attacker craft an XML message with very large payloads, recursive content, excessive nesting, malicious external entities, or with malicious DTDs (Data Type Documents)?
XML denial of service
Which attacks can be mitigated by time stamps and nonce?
Replay attacks
What organization has as its official mission to promote U.S. innovation and industrial competitiveness?
National Institute of Standards and Technology (NIST)
In which phase of Software Assurance Maturity Model do you execute a formal contract that guarantees non-disclosure of the client’s data and legal protection for the tester?
Preparation
What is the CERT?
The Computer emergency response teams (CERT) are expert groups that handle computer security incidents.
Other than Preparation and Conclusion, what is the third phase of the Software Assurance Maturity Model?
Conduct
What are the two functions of key escrow?
To recover keys in the event the original keys are lost or deleted, and to provide access to the data to other third parties, such as law enforcement investigations
What is the term for placing copies of private keys used to encrypt data in the safekeeping of a third party organization?
Key escrow
What is the purpose of integrity hashes?
To verify that files have not been changed or altered
What is the term for any method used to bypass multi-level security solutions?
Covert channel
What is the name of the online community dedicated to web application security, known for their top 10 list of web vulnerabilities?
Open Web Application Security Project (OWASP)
What is the term for hiding messages or information within other non-secret text or data?
Steganography
Why should you reduce the amount of information provided in error messages?
To prevent information leakage
Which type of penetration test requires the tester to have only limited knowledge of the target system(s)
Gray box