Reporting and Communication Flashcards

1
Q

Refers to the process of communicating between the client and the tester to determine whether an attack detected during a penetration test is coming from an authorized penetration tester or whether it is a real attack instigated by some third-party hacker.

A

De-confliction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to the process of communicating between the client and the tester to dial back the intensity of exploits or even stop them all together because of unsafe situations they may be causing

A

De-escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refers to a state of shared understanding between the client and the tester regarding the security posture of the client’s network.

A

Situational awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A response header lets a website tell browsers that it should only be accessed using HTTPS, instead of using HTTP

A

HTTP Strict Transport Security (HSTS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Command can be used on Linux systems to configure password aging for user accounts.

A

chage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • A high-level synopsis of the test and the results

- Typically, this is the first section of the report and is intended for less-technical audiences

A

Executive Summary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Section of your written report of findings will usually be constrained by the client’s risk appetite

A

Findings and remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Section of your written report used to identify the standard or guidelines you used to conduct the test

A

Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Section of your written report that contains risk ratings
  • These ratings allow the reader to prioritize risks as well as make comparisons between penetration tests conducted over time.
A

Metrics and Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Section of your written report that include recommendations

A

Conclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Occurs when either the client or the tester decides to change the focus of the penetration test from the agreed upon scope after the test has already started

A

Goal reprioritization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Involves running the value to be hashed through the hash function multiple times
  • increases the computation time required to hash each password
A

Key stretching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly