Things To Learn Flashcards

1
Q

Mutation Fuzzing

A

Also called Dumb Fuzzing

Takes previous input and mutates it to create the fuzzed input. Can alter characters or append strings to the end of the content.

There is no understanding of the format of the input data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Generational Fuzzing

A

Also called Intelligent fuzzing.

Creates new fuzzed input based on an understanding of the types of data used by programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the limits of fuzz testing?

A
  • Does not result in full coverage of the code
  • Detects simple errors that do not require
    complex manipulation of business logic.
    -
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bit flipping

A

Technique used in mutational fuzzing that flips bits of input data, either randomly or using a predetermined sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are working with your company to validate assessment and audit strategies. The immediate goal is to ensure that all auditors are following the processes and procedures defined by the company’s audit policies. Which type of audit should you use for this scenario?

Internal, External, Third Party, Hybrid

A

Explanation: Third-party testing is specifically geared to ensuring that the other auditors (internal and external) are properly following your policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A language for specifying security checklists.

A

XCCDF

Extensive Configuration Checklist Description Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A language for describing security testing procedures

A

OVAL

Open Vulnerability and Assessment Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A naming system for operating systems, applications, and devices

A

CPE

Common Platform Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A naming system for system configuration issues

A

CCE

Common Configuration Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A standardized scoring system for scribing the severity of security vulnerabilities

A

CVSS

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A naming system for describing security vulnerabilities

A

CVE

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three scoring factors used in CVSS?

A

Base
Temporal
Environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly