Security Assessment and Testing Flashcards

1
Q

What is the most important step of planning a security audit?

A

Setting a clear set of goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SOC 1 pertains to financial controls. What does SOC stand for?

A

Service Organization Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SOC 2 is a very detailed report that pertains to trust services. (Security, Availability, Confidentiality, Process Integrity, and Privacy). Is it intended for publication to the general public?

A

No. SOC 3 is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You want a non-intrusive test of your security by a third party that doesn’t know your network at all. What kind do you want?

A. White Box Penetration Test
B. Black Box Penetration Test
C. White Box Vulnerability Test
D. Black Box Vulnerability Test

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You want a thorough test of your security by a third party that knows your network a little, but not completely. Your internal security team will not be aware of the testing. What kind do you want?

A. Black Box Penetration Test, Blind Test
B. Grey Box Penetration Test, Double Blind Test
C. Grey Box Vulnerability Test, Double Blind Test
D. White Box Vulnerability Test, Blind Test

A

B

double-blind aka stealth assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You want a thorough test of your security by a third party that knows only publicly available data. Your internal security team will be aware of the testing What kind do you want?

A. Double Blind Test
B. Blind Test
C. Grey Box
D. White Box

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

These are scripted events that mimic the behaviors of real users and allow security professionals to systematically test the performance of critical services.

A

Synthetic transactions

think INTERMAPPER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The systematic testing of a given set of exchange points for data between systems and/or users.

A. Code Review
B. Log Review
C. Interface Testing
D. Management Review

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___________ measure the risk inherent in performing a given action or set of actions.

A

KRI

Key Risk Indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A formal meeting to determine whether the information security management systems are effectively accomplishing their goal.

A. Code Review
B. Log Review
C. Interface Testing
D. Management Review

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not a good step to take to prevent log tampering?

A. Replication
B. Cryptographic hash chaining
C. Remote Logging
D. Write Once Media
E. Duplex communication
A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of teaching a security set of skills that will allow people to perform specific functions better.

A

Security Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of exposing people people to security issues so that they may be able to recognize them and better respond to them.

A

Security Awareness Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social Engineering through a digital form

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A used case that includes threat actors and the tasks they want to perform on the system

A

misuse case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly