Testing Your Infrastructure Flashcards
Which of the following vulnerabilities can be avoided with data sanitization?
Embedded systems
End-of-life systems
Lack of vendor support
End-of-life systems
Eliminating data on end-of-life systems avoids vulnerabilities to sensitive data
Which of the following attacks is conducted by trying to get a view of sensitive information on a user’s screen?
Dumpster diving
Eavesdropping
Shoulder surfing
Shoulder surfing
Shoulder surfing is an attack in which the perpetrator tries to view sensitive information on a user’s screen
You are a security administrator in a company, and a user has just forwarded a suspicious e-mail to you that directs the user to click a link to a banking Web site and enter their credentials to verify the account. What type of social engineering attack is being attempted?
Phishing
Vishing
Man-in-the middle
Phishing
A phishing attack is conducted by sending an e-mail to an unsuspecting user to get the user to click a link in the e-mail and enter sensitive information, such as credentials or other personal information, into the site
An attacker calls an administrative assistant and tells him that she is the new executive assistant for the company senior vice president. She claims the VP is traveling, and she needs access to certain sensitive files in a file share. The attacker tries to bully the admin assistant into giving her permissions to the file share by threatening to have him fired if he doesn’t oblige. Which two characteristics of human behavior is the attacker trying to take advantage of in this attack? (Choose two.)
Trust
Fear of authority
Social proof
Respect of authority
Fear of authority
Respect of authority
The attacker is taking advantage of the human tendency to fear and respect authority figures
A person calls and tells you that he has locked his account because he forgot his remote access password. He tells you that he doesn’t have time to come down to your desk and positively identify himself because he is off-site at a customer facility and must present an important briefing to the customer within the next few minutes. He insists that he needs his remote access password changed immediately, but promises to come and see you after he returns to the office to verify his identity. What kind of social engineering tactic is being used in this attack?
Authority
Familiarity
Urgency
Urgency
The attacker is trying to use a tactic involving urgency of need to get the remote access password reset, without having his identity verified
Your manager wants you to attempt to determine what security vulnerabilities may be present in an application before it goes into production. You’re to take the application directly from the programmers and go through the program itself. Which of the following assessment techniques should you use first?
Architecture review
Design review
Code review
Code review
Code review is an appropriate assessment technique in this case to run first, since you are looking at the program itself before it goes into production. You would of course also run a network scanner and other tools against the box with the app loaded on it to test for security vulnerabilities
Which of the following types of assessments actually exploits weaknesses found in a system?
Architecture review
Vulnerability test
Penetration test
Penetration test
A penetration test is designed to exploit any vulnerabilities found in a system
You are performing a penetration test and are given only some basic information on the target system, including its IP address range and a basic network diagram. What type of penetration test is this considered to be?
Gray box test
Black box test
White box test
Gray box test
A gray box test is one in which the tester is given only limited information on the target network
A security testing tool that does not interfere with the operation of the system or network at all is considered:
Active
Passive
Less accurate
Passive
A passive tool does not interfere with the operation or performance of the system or network
Which of the following is considered a dangerous type of finding because it can actually mean that a potential security vulnerability goes undetected?
False positive
False negative
False flag
False negative
A false negative can mean that an actual vulnerability goes undetected