Review Questions - SYS701 - 5 - Security Assessment and Testing
19 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which one of the following security assessment techniques assumes that an organization has already been compromised and searches for evidence of that compromise?

  • War driving
  • Vulnerability scanning
  • Penetration testing
  • Threat hunting (correct)

Renee is configuring her vulnerability management solution to perform credentialed scans of servers on her network. What type of account should she provide to the scanner?

  • Domain administrator
  • Local administrator
  • Root
  • Read-only (correct)

Ryan is planning to conduct a vulnerability scan of a business-critical system using dangerous plug-ins. What would be the best approach for the initial scan?

  • Run the scan against production systems to achieve the most realistic results possible.
  • Run the scan during business hours.
  • Run the scan in a test environment. (correct)
  • Do not run the scan to avoid disrupting the business.

Which one of the following values for the CVSS attack complexity metric would indicate that the specified attack is simplest to exploit?

<p>Low (C)</p> Signup and view all the answers

Tara recently analyzed the results of a vulnerability scan report and found that a vulnerability reported by the scanner did not exist because the system was actually patched as specified. What type of error occurred?

<p>False positive (A)</p> Signup and view all the answers

Brian ran a penetration test against a school's grading system and discovered a flaw that would allow students to alter their grades by exploiting a SQL injection vulnerability. What type of control should he recommend to the school's cybersecurity team to prevent students from engaging in this type of activity?

<p>Integrity (B)</p> Signup and view all the answers

Which one of the following security assessment tools is least likely to be used during the reconnaissance phase of a penetration test?

<p>Metasploit (C)</p> Signup and view all the answers

Which one of the following tools is most likely to detect an XSS vulnerability?

<p>Web application vulnerability scanner (B)</p> Signup and view all the answers

During a penetration test, Patrick deploys a toolkit on a compromised system and uses it to gain access to other systems on the same network. What term best describes this activity?

<p>Lateral movement (A)</p> Signup and view all the answers

Zian is a cybersecurity leader who is coordinating the activities of a security audit. The audit is being done to validate the organization's financial statements to investors and involves a review of cybersecurity controls. What term best describes this audit?

<p>External audit (A)</p> Signup and view all the answers

Which one of the following assessment techniques is designed to solicit participation from external security experts and reward them for discovering vulnerabilities?

<p>Bug bounty (C)</p> Signup and view all the answers

Kyle is conducting a penetration test. After gaining access to an organization's database server, he installs a backdoor on the server to grant himself access in the future. What term best describes this action?

<p>Persistence (D)</p> Signup and view all the answers

Which one of the following techniques would be considered passive reconnaissance?

<p>WHOIS lookups (C)</p> Signup and view all the answers

Which element of the SCAP framework can be used to consistently describe vulnerabilities?

<p>CVE (B)</p> Signup and view all the answers

Bruce is conducting a penetration test for a client. The client provided him with full details of their systems in advance. What type of test is Bruce conducting?

<p>Known environment test (C)</p> Signup and view all the answers

Lila is working on a penetration testing team and she is unsure whether she is allowed to conduct social engineering as part of the test. What document should she consult to find this information?

<p>Rules of engagement (C)</p> Signup and view all the answers

Grace would like to determine the operating system running on a system that she is targeting in a penetration test. Which one of the following techniques will most directly provide her with this information?

<p>Footprinting (B)</p> Signup and view all the answers

Kevin recently identified a new security vulnerability and computed its CVSS base score as 6.5. Which risk category would this vulnerability fall into?

<p>Medium (B)</p> Signup and view all the answers

Which one of the CVSS metrics would contain information about the type of account access that an attacker must have to execute an attack?

<p>PR (C)</p> Signup and view all the answers

Flashcards

Threat Hunting

A security assessment technique that assumes a breach has occurred and actively searches for evidence of it.

Read-only Account (for Vulnerability Scans)

An account with minimal permissions, allowing the scanner to read system information without making changes.

Test Environment for Vulnerability Scans

Running the scan in an isolated environment that mirrors the production system to avoid potential disruptions or damage.

CVSS Attack Complexity: Low

A CVSS metric indicating the ease of exploiting a vulnerability; 'Low' indicates the least complex attack.

Signup and view all the flashcards

False Positive (in Vulnerability Scanning)

An error in vulnerability scanning where a vulnerability is reported but doesn't actually exist on the system.

Signup and view all the flashcards

Integrity Controls

Controls that ensure data is accurate and reliable, preventing unauthorized modification.

Signup and view all the flashcards

Metasploit (in Reconnaissance)

A security assessment tool primarily used for exploiting vulnerabilities, not initial information gathering.

Signup and view all the flashcards

Web Application Vulnerability Scanner

A specialized scanner designed to identify vulnerabilities in web applications, including XSS.

Signup and view all the flashcards

Lateral Movement

Moving from one compromised system to other systems within the same network.

Signup and view all the flashcards

External Audit (Cybersecurity)

An audit conducted by an independent third party to validate an organization's financial statements.

Signup and view all the flashcards

Bug Bounty

A program which invites and rewards security researchers for finding and reporting vulnerabilities.

Signup and view all the flashcards

Persistence (Penetration Testing)

Maintaining access to a compromised system over a period of time.

Signup and view all the flashcards

Passive Reconnaissance

Gathering information without directly interacting with the target system.

Signup and view all the flashcards

CVE (Common Vulnerabilities and Exposures)

Common Vulnerabilities and Exposures, a standardized way to identify and describe vulnerabilities.

Signup and view all the flashcards

Known Environment Test

A penetration test where the client provides full details of their systems in advance.

Signup and view all the flashcards

Rules of Engagement

A document defining the scope and limitations of a penetration test.

Signup and view all the flashcards

Footprinting

Gathering information about a target system, including its operating system.

Signup and view all the flashcards

CVSS Score 6.5: Risk Category

A CVSS base score range indicating a moderate level of risk.

Signup and view all the flashcards

CVSS Metric: PR (Privileges Required)

Privileges Required, a CVSS metric that describes the level of access an attacker needs.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser