Security Assessment and Testing Flashcards

1
Q

¿Cuál es el objetivo del Vulenrability Assessment?

A

What I’m doing is looking for weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

¿Cuáles son los dos tipos de Vulnerability Assessment?

A

Physical/ Administrative/ Logical.

Identify Weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ejemplos de Vulenarbility Assessment Físicos.

A

Las puertas y/o ventanas cierra bien, políticas de escritorio limpio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ejemplos de Vulnerability Assessment Administrativos.

A

Pen-test, social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

¿Cuál es el objetivo de los penetration testings?

A

What looking is if we can exploit the weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

¿Cuál es el objetivo de los Red y Blue Teams?

A
Red Teams (attack)
Blue teams (defend)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

¿Cuáles son los tipos de pruebas para el pen-testing¡

A
  • Black Box
  • Gray Box
  • White box
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

¿Cual es el objetivo del Vulnerability Scanning?

A

Identifying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

¿Cuáles son los pasos de la metodología de ataque?

A
  • Reconnaisance
  • Footprinting Network
  • Fingerprinting
  • Vulnerability Assessment
  • The “attack”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

¿En qué consiste la etapa de Reconnaisance?

A

Gather Internet Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

¿En qué consiste la etapa de Footprinting Network?

A

Discover the essentials devices on your network, to map your network. NMAP, Ping sweep.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

¿En qué consiste la etapa de Fingerprinting?

A

Learn from the network. Identifying host information, port scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

¿En qué consiste la etapa de Vulnerability Assessment?

A

Identifying weaknesses in system configurations. Discovering unpatched SW.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

¿En qué consiste la etapa de Attack?

A

Penetration, privilege escalations, root kit, cover tracks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

¿Cuál es el propósito del pen-testing?

A

Overall purpose is to determine subjects ability to withstand an attack and determine effectiveness of current security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

¿Cuáles son los requerimientos básicos para poder realizar un pen-test dentro de una empresa?

A
  • Meet with senior management to determine the goal of the assessment.
  • Document rules of engagement.
  • Get sign off from senior management.
17
Q

Tester should not be the one suggestins remediation, true or false?

A

True, because this violates separation of duties.

18
Q

¿Cuáles son los tipos de pen test?

A
  • Physical security
  • Administrative Security
  • Logical Security
19
Q

Ejemplos de pruebas físicas de pentest:

A
  • Access into building or department.

- Wiring closets, locked file cabinets, offices, server room, sensitive areas.

20
Q

Ejemplos de pruebas Administrativas de pentest:

A
  • Help desk gving out sensitive information, data on disposed disks.
21
Q

Ejemplos de pruebas lógicas de pentest:

A
  • Attacks on systems, networks, communication.
22
Q

¿Cuáles son las características de los IDS?

A
  • Passive in action
  • Gathering information
  • Identify Suspicious activity
  • Log Activity
  • Respond (alert people)
23
Q

¿Cuáles son los componentes de un IDS?

A
  • Sensor - Data collector
  • Analysis Engine, signature database
  • User interface
24
Q

¿Qué hace un HIDS?

A

Examine the operation of a single system independently to determine of anything “off note” is going on.

25
Q

A NIDS cannot look encripted data, true or false?

A

True.

26
Q

¿Qué tipo de eventos registra un HIDS?

A
  • Logins
  • System Log files
  • Application log files
  • File activity
  • Configuration files changes
  • Use of certain programs
  • Network traffic to/from PC
27
Q

¿Cuáles son las ventajas de un HIDS?

A
  • Can be operating system and application specific.

- Thay can look at data after it’s been decrypted.

28
Q

¿Cuáles son las desventajas de un HIDS?

A
  • Only protec one machine
  • Use local system resources
  • Scalability
29
Q

¿Qué es un NIDS?

A

Network based IDS, a concepto focused on watching an entire network and all associated. machines. Focuses specifically on netwokr traffic, in this case the sensor is sometimes called a traffic collector.

30
Q

¿Qué tipo de eventos registra o busca un NIDS?

A
  • Source IP
  • Destination IP
  • Protocol
  • Port numbers
  • Data content
  • DoS Attacks
  • Port scans
  • Malicious content
31
Q

¿Cuáles son las ventajas de un NIDS?

A

A NIDS can see things that are happening on multiples machines, it gots a bigger picture and may see distributed attacks that a HIDS would miss.

32
Q

¿Qué hace un Analysis Engine del tipo Pattern Machine?

A

SIgnature based, only as good as the last update. Does not protect against today attacks.

33
Q

¿Qué hace un Analysis Engine del tipo Profile Machine?

A

Anomaly based systems, look for changes in normal behavior.

Anomaly/Behavior/Heuristics

34
Q

¿En qué consiste un Evassion attack?

A

Many small attacks from different directions.

35
Q

¿En qué consiste un Insertion attack?

A

Adding meaningless information (without modifying the payload) to a known attack.

36
Q

¿Cuál es el objetivo de un honeypot?

A

Administrator hope that intruders will attack this system instead of their production systems.

37
Q

¿Qué significan los términos “enticement” “entrapment”?

A

Enticement (tentacion)

Entrapment (atrapamiento, tender una trampa)