CISSP Domain 6: Security Assessment and Testing

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

We are at our annual corporate IT security training event and we are talking about social engineering. Which of these are types of social engineering? (Select all that apply).

- Consensus - Vishing - Urgency - Whale phishing

While penetration testing is often very helpful in improving our security posture and finding vulnerabilities. They can at times also mean nothing, why is that?

- We do not act on their report. - The test is only as good as the tester. If they are no good, we have no clue how vulnerable we are. - We give them too narrow parameters and because of this they can't do a real penetration test.

Which phase could a penetration tester go to after they are finished with one of the "System browsing" phases? (Select all that apply).

- discovery - install additional tools

Depending on the type of software and where we are in the software development lifecycle, we would do different types of tests. Which of these are COMMON types of tests we would do at the end of the development lifecycle? (Select all that apply).

- integration testing - installation testing - component interface testing - operational acceptance testing

Before we engage the penetration testers we want to hire, we need to build a SOW (Statement Of Work ). Who needs to be involved in building it?

- our legal department - senior management - IT Security

We are using social engineering, which of these are effective types of social engineering?

- urgency - intimidation - authority

As part of a security assessment we are having an external company do penetration testing. What do we call a penetration test where the tester has full admin level knowledge about our organization and IT infrastructure? (Select all that apply).

- white box - crystal box - clear box

In which operating systems can an attacker elevate their privileges to gain root or administrator privileges?

- windows - linux - MacOS

We want penetration testers to prove they can get to our sensitive documents, but we do not want them to access any of them. What could we use for them to prove they reached their target?

A dummy file is created and it is their target

We have hired a penetration tester, and she has been given partial knowledge of our organization and infrastructure. Which access level would that emulate?

A normal employee

At the end of our software development project, we are doing interface testing. What are we testing?

All interfaces exposed by the application.

A penetration tester is calling an employee. They tell the employee they need to give them the information they are asking for, because the caller is the CEO's executive assistant. What is this an example of?

Authority

When we implement centralized logging, we want it to be:

Automated, secure and administrators should have limited access

What would be a reason to do misuse case testing on our software?

Because attackers do not act like normal users, we need to test against that.

In software testing, we are doing synthetic transaction. What does that mean?

Build scripts and tools that would simulate normal user activity

You mentioned a vishing attack to a colleague and the director from HR heard it. He stops you and asks you what that is. Which of these could be an answer?

Calling our dispatch and trying to get information through social engineering

A team of penetration testers, with full physical access to our facility, have found Protected Health Information (PHI) hard copies laying around. Which of our policies are our employees NOT following?

Clean desk policy

What would a penetration testing Statement Of Work (SOW) NOT include?

Complete and accurate employee Protected Health Information (PHI)

In software testing, component interface testing would test what?

Data handling passed between different units or subsystems

Which of these is NOT a normal phase of a white hat hacker's strategy?

Deleting their tracks, the audit files and logs

We have a contract with some penetration testers. In which phase would the tester look for vulnerabilities and design the attack?

Discovery

When an attacker is wardriving. what do they do?

Driving around trying to gain access to unsecured or weak security wireless access points

We have a company doing a penetration test for us. In which phase would the tester try to gain higher level access, and ultimately, if they can, admin access?

Escalate privileges

We are doing different types of audits in our organization. Who would perform a structured audit?

External auditors

To ensure our compliance with a certain standard, we have a structured audit. What would that entail?

External auditors comes in

When a penetration tester is doing a white box penetration test, they have how much knowledge?

Full knowledge and privileges access to systems

We want to implement a solution to prove our logs has not been altered. Which of these could be an option we would consider?

Hashing

In our software code testing, one of the coders is mentioning the test coverage analysis. What is she talking about?

How much of the code was tested in relation to the entire application

We have finished our initial software development and we are doing our software testing. In integration testing, we would test what?

Interfaces between components against the software design

To ensure our compliance before we pay for a structured audit, we want to do an "unstructured" audit. What would that entail?

Internal auditors looking for flaws

In our software testing, we are doing a black box testing. How much information would we have?

Just the software, no source code

Which of these would we NOT look at a security assessment?

KPI

We have hired an IT security firm to do penetration testing on our organization. Which of these could be something they would use?

Kali Linux

Which of these is NOT a common problem organizations face regarding audit record management?

Logs are reviewed regularly and in a timely fashion.

There are many pitfalls when we work with the audit record management in our organization. Which of these is NOT one of those common problems?

Logs are stored on a central secure server

As part of our software testing, we are performing regression testing. What does that mean?

Lost or missing features after major code changes

If we are doing a vulnerability scan, it would normally show us all these, EXCEPT which?

Malware

We have hired a team of penetration testers to audit our network for vulnerabilities. During a test, one of the testers discovers a real attack underway. What should the tester do?

Notify the organization immediately

An attacker has discovered one of the SSIDs in our organization. They plan to use the information in their initial attack, what have they discovered?

Our wireless

What could a vulnerability scan possibly help us find?

Outdated software, missing patches and system misconfigurations.

When a penetration tester is doing gray box testing, how much knowledge would they have about our organization and our IT infrastructure?

Partial knowledge; user or vendor access level.

As part of our software testing, we are doing static software testing. What are we doing?

Passively test the code, but not run it

We are doing security audits and we test against published standards. Which of these is NOT one of the standards we would test against?

RBAC

Penetration testers have been looking for vulnerabilities for some weeks. What would be the FINAL stage of a penetration test?

Reporting

Which type of audit could we use to ensure our employees are following our policies?

Review user logs

What would be one of the EASIEST ways to confirm if our access control mechanics are working?

Reviewing security audit logs

After a security audit and penetration testing, we were notified about some security issues on all our switches. We chose not to implement the recommended mitigations this year because it was deemed too expensive. If our switches are compromised who is responsible?

Senior management

We have discovered an employee has installed a rogue access point to get wireless at his desk. The wireless was compromised, and we have lost the Personally Identifiable Information (PII) of over 10,000 customers. What could we have done to prevent this other than training and awareness?

Shut all unused switch ports down

As part of our annual security audit we hired a pen testing company. What could be some of the tools they would use?

Social engineering

When an attacker is using intimidation and threats, it is a type of?

Social engineering

Which low tech or no tech attack can often be just as successful as very technical attacks?

Social engineering

An attacker, using social engineering, could use all of these EXCEPT which?

Spear fishing

In our software testing, before the release, we are doing fuzz testing. What would that entail?

Submit random malformed input to crash the software or elevate privileges.

A new network administrator is asking questions about a security audit we are having done. What would you explain to her it is?

Testing against a published standard

One of the distinct phases of software testing is installation testing. What are we testing in this phase?

That the software installs correctly on the customers hardware

What do we need to ensure is synchronized for our audit logs to be admissible in court?

The clocks of all systems in an organization should be connected to multiple synchronized NTP servers, to ensure all clocks are synchronized. If logs have another timestamp than the real time, they are not usable in a trial. NTP

In our software testing we are doing, "unit testing", what are we testing?

The functionality of a specific section of code

Penetration testers have found a vulnerability on some of our switches. The vulnerability is an exploitable, who would patch the switch?

The network team

Our senior leadership has decided to do a double-blind penetration test. What does that mean?

The security and network team is not aware it is happening. The testers have no knowledge of our organization.

In our software testing, we are doing a white box test, how much information do we have?

The software, source code, data structures and variables.

What does SOC2 type 1 report on?

The suitability of the design of controls

What does SOC2 type 2 report on?

The sustainability of the design AND operating effectiveness of controls.

On a vulnerability scan, some of the vulnerabilities came up as LOW. What could be the reason for them showing as LOW?

The vulnerability is there, but it is not exploitable or if it is exploitable impact is negligible

Why would we use an RTM (Requirements Traceability Matrix) in software testing?

To map requirements to the testing plan

Why would we choose to delete a user account after the employee leaves the organization?

User's privacy protection

What could be used to provide audit log integrity during an attack?

Using WORM media for audit logs.

Which type of testing will look for weaknesses but does NOT exploit them?

Vulnerability scans

When a penetration tester is trying to gain sensitive information from an employee with social engineering. Which type of access control type is she testing?

administrative

In our software testing we are using fuzz testing. Which type of testing is that?

black box

which of these would be a form of penetration testing?

black box testing would be a form of penetration testing

When we talk about the different types of hackers, which of them would be skilled and malicious?

black hat

Why would we choose to go with an internal audit over a 3rd party audit?

cost

As part of her regular duties, Jane is reviewing our logs. When she does that, it is which type of a control?

detective

When we are reviewing our audit logs, it is which type of a control?

detective

What would we NOT look at in a security assessment?

employee performance

What is another term we could use for penetration testing?

ethical hacking

In a penetration test, in which phase would the tester try to get onto our network?

gaining access

Which type of hacker is skilled and often alerts companies to vulnerabilities before publishing them?

gray hat

In which type of software testing do we progressively test larger and larger groups of software components until the software works as a whole?

integration testing

In which form of software testing do we test the connections between the different systems and components?

interface testing

Prior to an external structured audit, we would often do an 'unstructured' audit. Who would perform that?

internal auditors

A pen tester is calling one of our employees. The pen tester explains to the employee the company will be hit with a lawsuit if he won't do what he is told. Which type of social engineering is the pen tester using?

intimidation

In our fuzz testing, we analyze data and change the fuzz input iteratively. What is this called?

mutation fuzzing

What do we often uncover in our vulnerability scans?

open ports that should not be

Very technical hacking attempts can be exceedingly difficult to pull off. Low tech or no-tech attacks like social engineering can often be successful. Why is that?

people want to be helpful

The team of pen testers we have hired, is trying to gain access to our facility by trying to find an open door or window. What type of access control are they testing?

physical

Penetration testers with full physical access to our facility have found Protected Health Information (PHI) hard copies laying around. Which of our policies are our employees NOT following?

print policy

We have tested our software and we have found over 10,000 flaws. What should our next steps be?

rate them on likelihood of exploit and impact and address the critical issues.

After we have applied a patch to our software, which type of test should we use?

regression testing

We have hired a penetration testing company to find security flaws in our organization. They are at the enumeration phase, what are they doing?

scanning

A penetration tester calls an employee and explains that if they act now, they can save 50% off on certain software, but if they wait until tomorrow, the savings will be lost. What is this an example of?

scarcity

We are wanting to hire outside penetration testers. Who in our organization would set the goals for the penetration test?

senior management

When an attacker is using intimidation, it is a form of what?

social engineering

We have hired an external company to do a penetration test. In which phase would the tester look around on our network, try to find new attack vectors, or maybe go back to the discovery phase?

system browsing

When a penetration tester is trying to gain access to sensitive information from one of our servers, she is testing which type of access control?

technical

When we do our dynamic software testing, how are we testing?

test the code while executing it

In our software testing we are using synthetic transactions. What is a key characteristic of those?

they simulate real traffic

there are a lot of challenges with audit record management. Which of these is not one of them?

we are storing logs and alerts for too long

In a penetration test, we are giving the tester detailed knowledge of our environments. Which type of penetration testing is she performing?

white box

Which type of hacker is skilled and non-malicious?

white hat


संबंधित स्टडी सेट्स

Variable Annuity QBank (went over)

View Set

Ms.Kovich Rational Numbers Quiz, Thusday 22nd

View Set

Health - Group insurance - Practice Questions

View Set

TEST 1: Chapter 3 -- Movement across the Cell Membrane

View Set