Security Assessment and Testing (ANT) Flashcards

1
Q

Active Security Testing

A

Security testing that involves direct interaction with a target, such as sending packets to a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Banner Grabbing

A

The process of capturing banner information - such as application type and version - that is transmitted by a remote port when a connection is initiated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer Security Log Management

A

Log management for computer security log data only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Covert Testing

A

Testing performed using covert methods and without the knowledge of the organization’s IT staff, but with full knowledge and permission of upper management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Event

A

Something that occurs within a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Event Aggregation

A

The consolidation of similar log entries into a single entry containing a count of the number of occurrences of the event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Event Correlation

A

Finding relationships between two or more log entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Event Filtering

A

The suppression of log entries from analysis, reporting, or long-term storage because their characteristics indicate that they are unlikely to contain information of interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Event Reduction

A

Removing unneeded data fields from all log entries to create a new log that is smaller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

External Security Testing

A

Security testing conducted from outside the organization’s security perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Facility

A

The message type for a syslog message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

False Positive

A

An alert that incorrectly indicates that a vulnerability is present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

File Integrity Checking

A

Software that generates, stores, and compares message digests for files to detect changes made to the files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information Security Testing

A

The process of validating the effective implementation of security controls for information systems and networks, based on the organization’s security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Internal Security Testing

A

Security testing conducted from inside the organization’s security perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Log

A

A record of the events occurring within an organization’s systems and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Log Analysis

A

Studying log entries to identify events of interest or suppress log entries for insignificant events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Log Archival

A

Retaining logs for an extended period of time, typically on removable media, a storage area network (SAN), or a specialized log archival appliance or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Log Clearing

A

Removing all log entries from a log that precede a certain date and time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Log Compression

A

Storing a log file in a way that reduces the amount of storage space needed for the file without altering the meaning of its contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Log Conversion

A

Parsing a log in one format and storing its entries in a second format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Log Entry

A

An individual record within a log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Log File Integrity Checking

A

Comparing the current message digest for a log file to the original message digest to determine if the log file has been modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Log Management

A

The process for generating, transmitting, storing, analyzing and disposing of log data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Log Management Infrastructure

A

The hardware, software, networks, and media used to generate, transmit, analyze, and dispose of log data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Log Normalization

A

Converting each log data field to a particular data representation and categorizing it consistently

27
Q

Log Parsing

A

Extracting data from a log so that the parsed values can be used as input for another logging process

28
Q

Log Preservation

A

Keeping logs that would normally be discarded, because they contain records of activity of particular interest

29
Q

Log Reduction

A

Removing unneeded entries from a log to create a new log that is smaller

30
Q

Log Reporting

A

Displaying the results of log analysis

31
Q

Log retention

A

Archiving logs on a regular basis as part of standard operational activities

32
Q

Log Rotation

A

Closing a log file and opening a new log file when the first log file is considered complete

33
Q

Log Viewing

A

displaying log entries in a human-readable format

34
Q

Message Digest

A

A digital signature that uniquely identifies data and has the property that changing a single bit in the data will cause a completely different message digest to be generated

35
Q

Network Discovery

A

The process of discovering active and responding hosts on a network, identifying weaknesses, and learning how the network operates

36
Q

Network Sniffing

A

A passive technique that monitors network communication, decodes protocols, and examines headers and payloads for information of interest. It is both a review technique and a target identification and analysis technique

37
Q

Operating System Fingerprinting

A

Analyzing characteristics of packets sent by a target, such as packet headers or listening ports, to identify the operating system in use on the target

38
Q

Overt Testing

A

Security testing performed with the knowledge and consent of the organization’s IT staff

39
Q

Passive Security Testing

A

Security testing that does not involve any direct interaction with the targets, such as sending packets to a target

40
Q

Password Cracking

A

The process of recovering secret passwords stored in a computer system or transmitted over a network

41
Q

Penetration Testing

A

Security testing in which evaluators mimic real-world attacks in an attempt to identify ways to circumvent the security features of an application, system, or network. Penetration testing involves issuing real attacks on real systems and data, using the same tools and techniques used by actual attackers. Most penetration tests involve looking for combination of vulnerabilities on a single system or multiple systems that can be used to gain more access than could be achieved through a single vulnerability.

42
Q

Phishing

A

A digital form of social engineering that uses authentic-looking - but bogus - emails to request information from users or direct them to a fake website that requests information

43
Q

Plan of Actions and Milestones

A

A document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones for meeting the tasks, and schedule milestone completion dates.

44
Q

Port Scanner

A

A program that can remotely determine which ports on a system are open (e.g., whether systems allow connections through those ports).

45
Q

Review Techniques

A

Passive information security testing techniques, generally conducted manually, that are used to evaluate systems, applications, networks, policies, and procedures to discover vulnerabilities. They include documentation, log, ruleset, and system configuration review; network sniffing, and file integrity checking.

46
Q

Rogue Device

A

An unauthorized node on a network

47
Q

Rule-Based Event Correlation

A

Correlating events by matching multiple log entries from a single source or multiple sources based on logged values, such as timestamps, IP addresses, and event types

48
Q

Rules of Engagement

A

Detailed guidelines and constraints regarding the execution of information security testing. The ROE is established before the start of a security test, and gives the test team authority to conduct defined activities without the need for additional permissions.

49
Q

Ruleset

A

A collection of rules or signatures that network traffic or system activity is compared against to determine an action to take - such as forwarding or rejecting a packet, creating an alert, or allowing a system event.

50
Q

Security Information and Event Management Software

A

A program that provides centralized logging capabilities for a variety of log types

51
Q

Social Engineering

A

The process of attempting to trick someone into revealing information (e.g., a password)

52
Q

Syslog

A

a protocol that specifies a general log entry format and a log entry transport mechanism

53
Q

Target Identification and Analysis Techniques

A

Information security testing techniques, mostly active and generally conducted using automated tools, that are used to identify systems, ports, services, and potential vulnerabilities. Target identification and analysis techniques include network discovery, network port and service identification, vulnerability scanning, wireless scanning, and application security testing.

54
Q

Target Vulnerability Validation Techniques

A

Active information security testing techniques that corroborate the existence of vulnerabilities. They include password cracking, remote access testing, penetration testing, social engineering, and physical security testing.

55
Q

Version Scanning

A

The process of identifying the service application version currently in use

56
Q

Virtual Machine

A

Software that allows a single host to run one or more guest operating systems

57
Q

Vulnerability

A

Weakness in an information system, or in system security procedures, internal controls, or implementation, that could be exploited or triggered by a threat source

58
Q

Vulnerability Scanning

A

a technique used to identify hosts/host attributes and associated vulnerabilities

59
Q

Code Coverage Report

A

Information on the functions, statements, branches, and conditions covered in testing

60
Q

Mutation (Dumb) Fuzzing

A

Takes previous input values from actual operation of the software and manipulates it to create input. It might alter the characters of the content, append strings to the end of the content, or perform other data manipulation techniques

61
Q

Real User Monitoring

A

Aims to capture and analyze every transaction of a user

62
Q

Security Testing

A

Verifies that a control is functioning properly using automated scans, tool-assisted and manual attempts to undermine security controls

63
Q

STRIDE

A

Often used in relation to assessing threats against applications or operating systems, threat categorization scheme. Stands for spoofing, tampering, repudiation, information disclosure, denial of service, elevation of privilege

64
Q

Synthetic Performance Monitoring

A

User scripted or recorded data such as traffic capture, database performance, website performance not to be confused with User Session Monitoring