Security Test Cases Flashcards

1
Q

Steps in Penetration Testing

A
  1. Reconnaissance (discovery and enumeration)
  2. Attack and exploitation
  3. Removal of evidence
  4. Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common Methods Security testing - Fuzzing

A

Brute Force providing multitude of inputs.
May detect input validation errors, buffer overflows.
Used in White, black, gray box testing.
Generation-based fuzz testing uses the specifications of input streams to determine the data streams that are to be used in testing. Mutation-based fuzzers take known good traffic and mutate it in specific ways to create new input streams for testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common Methods Security testing - Simulation

A
  • in Production like env. helping discover issues associated with the instantiation of an application and its operation in the production environment.
  • typically last line of defense.
  • performance testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common Methods Security testing - Scaning

A

Scan for
- networks, OS fingerprinting,
- compliance with PCI DD or sarbanes oxley,
- vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common Methods Security testing - Failure mode or Break testing

A

Break testing is where one uses inputs that are specifically designed to trigger failures.
- stress/load testing
- simulate conditions that result in incorrect outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FIPS -2 (Federal Information Processing Standards)

A

specifies requirements, specifications, and testing of cryptographic systems for the U.S. federal government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly