Udemy-Domain 6 Flashcards

1
Q

a security ___ tests existing systems against a published industry standard

A

Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a SOC 2 Type ___ report focusses on the Suitability of control designs

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a SOC 2 Type ___ report focuses on the Suitability and Effectiveness of controls

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pen testing follows the following 6 steps:

A
  1. Planning
  2. Reconnaissance
  3. Scanning
  4. Vulnerability Assessment
  5. Exploitation
  6. Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pen testing can be done on a ___ environment, but since it is not a perfect copy of our working network the vulnerabilities will not be the same

A

DR (Disaster Recovery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is when a modem automatically dials a list of phone numbers hoping to reach another modem

A

war dialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ is driving (or walking) around looking for wireless access points

A

war driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ testing is testing certain sections of code in isolation

A

unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ testing is testing the handling of data passed between units of subsystems within software

A

component interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is used to test operational readiness of code as part of quality assurance

A

operational acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ testing looks for defects in code after a major change has occurred

A

regression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ testing is inputting different values into a program to try to break it, then iteratively modifying the values entered depending on the response of the program

A

mutating fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ or ___ testing tries to break a program by inputting examples of data that meet all the possible criteria (upper/lower bounds, valid/invalid, etc.) rather than all possible values

A

all pairs; pairwise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ testing attempts to break a program with intentionally malicious data entry a normal user would never consider

A

misuse case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a ___ examines how much of our code has been tested to make sure there are no significant gaps in testing

A

test coverage analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly