Week 10 Flashcards
What is the primary distinction between a vulnerability assessment and penetration testing?
A vulnerability assessment identifies and prioritizes vulnerabilities in a system, whereas penetration testing actively exploits vulnerabilities to evaluate the system’s resistance to real-world attacks.
In a third-party audit, the auditing organization typically has no contractual relationship with the target organization.
False. A third-party audit is conducted by an independent entity often to meet compliance requirements, but it is contractually agreed upon between both parties.
Which of the following is an example of a technical control?
A) Incident response plan
B) Encryption protocols
C) Employee training
D) Vendor security questionnaire
B) Encryption protocols
In the context of security audits, ___________ is a systematic, documented approach used to determine whether an organization complies with external standards such as ISO 27001 or SOC 2.
Audit Process
Define cryptographic hash chaining and its significance in log integrity.
Cryptographic hash chaining involves appending a hash of each log event to the previous one, ensuring the integrity of the log by providing tamper evidence across the entire log sequence.
Regression testing is primarily concerned with verifying the functional aspects of new software features without regard to existing functionality.
False. Regression testing ensures that existing functionality remains intact after changes, such as patches or feature enhancements.
Which technique is most effective in preventing race conditions during security assessments?
A) Static code analysis
B) Black-box testing
C) Dynamic application security testing (DAST)
D) Code instrumentation with mutex locks
D) Code instrumentation with mutex locks
___________ is a form of misuse testing where an organization simulates attacks by dialing large sequences of phone numbers to identify open modems.
War Dialing
Explain the concept of Synthetic Transactions in operational testing.
Synthetic transactions are scripted operations that simulate user activity to test system performance and availability without requiring real users.
In interface testing, both known valid and invalid exchanges between components should be tested to verify system behavior across a spectrum of interactions.
True
Which of the following is a primary challenge associated with audit log management in large environments?
A) Log data is immutable.
B) Audit logs must be encrypted during collection.
C) Audit logs can grow rapidly, making real-time analysis difficult.
D) Audit logs are stored in volatile memory.
C) Audit logs can grow rapidly, making real-time analysis difficult.
___________ is a structured discussion-based exercise where teams review their roles and responses during a simulated security incident in a controlled setting.
Tabletop Exercise (TTX)