Week 10 Flashcards

1
Q

What is the primary distinction between a vulnerability assessment and penetration testing?

A

A vulnerability assessment identifies and prioritizes vulnerabilities in a system, whereas penetration testing actively exploits vulnerabilities to evaluate the system’s resistance to real-world attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a third-party audit, the auditing organization typically has no contractual relationship with the target organization.

A

False. A third-party audit is conducted by an independent entity often to meet compliance requirements, but it is contractually agreed upon between both parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an example of a technical control?
A) Incident response plan
B) Encryption protocols
C) Employee training
D) Vendor security questionnaire

A

B) Encryption protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the context of security audits, ___________ is a systematic, documented approach used to determine whether an organization complies with external standards such as ISO 27001 or SOC 2.

A

Audit Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define cryptographic hash chaining and its significance in log integrity.

A

Cryptographic hash chaining involves appending a hash of each log event to the previous one, ensuring the integrity of the log by providing tamper evidence across the entire log sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Regression testing is primarily concerned with verifying the functional aspects of new software features without regard to existing functionality.

A

False. Regression testing ensures that existing functionality remains intact after changes, such as patches or feature enhancements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which technique is most effective in preventing race conditions during security assessments?
A) Static code analysis
B) Black-box testing
C) Dynamic application security testing (DAST)
D) Code instrumentation with mutex locks

A

D) Code instrumentation with mutex locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___________ is a form of misuse testing where an organization simulates attacks by dialing large sequences of phone numbers to identify open modems.

A

War Dialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the concept of Synthetic Transactions in operational testing.

A

Synthetic transactions are scripted operations that simulate user activity to test system performance and availability without requiring real users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In interface testing, both known valid and invalid exchanges between components should be tested to verify system behavior across a spectrum of interactions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a primary challenge associated with audit log management in large environments?
A) Log data is immutable.
B) Audit logs must be encrypted during collection.
C) Audit logs can grow rapidly, making real-time analysis difficult.
D) Audit logs are stored in volatile memory.

A

C) Audit logs can grow rapidly, making real-time analysis difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___________ is a structured discussion-based exercise where teams review their roles and responses during a simulated security incident in a controlled setting.

A

Tabletop Exercise (TTX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly