MindMap Gallery CISSP Study Notes-15 (Security Assessment and Testing)
This is a mind map about CISSP study notes-15 (security assessment and testing). The main content includes: review questions, exam key points, and knowledge points.
Edited at 2024-03-11 15:40:53This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
CISSP Study Notes-15 (Security Assessment and Testing)
Knowledge points
Build security assessment and testing scenarios
Safety test
The test plan uses a risk prioritization approach to system testing
assess safety
Outcome: Assessment report to management with specific recommendations as conclusion
NIST: Components: Specifications, Mechanisms, Activities, People
security audit
Internal Audit
External Audit
third party audit
SOC1 Statement
SOC2 Statement Confidential, can be disclosed to the public according to confidentiality agreement
SOC3 Statement Public
auditing standards
COBIT
Conduct a vulnerability assessment
Vulnerability description
SCAP
Vulnerability Scan
Network discovery scan
Detect open ports on the system and do not scan for vulnerabilities
nmap
Network vulnerability scanning
Web application vulnerability scanning
Database vulnerability scanning
Vulnerability Management Workflow
Detection
verify
repair
Penetration testing
White box
gray box
black box
Compliance check
Test software code review and testing
Code review (peer review)
Static testing SAST
Dynamic testing DDAS
Fuzz testing
Interface testing
API
UI
physical interface
Misuse case testing
Test coverage analysis
Website monitoring
Implement security management processes
Log review
Account management
Disaster recovery and business continuity
training and awareness
Key performance and risk indicators
Exam points
Understand the importance of security assessment and testing programs. Security assessment and testing programs are important mechanisms for verifying whether security controls continue to be effective. Security assessment and live testing methods include various tools such as vulnerability assessments, penetration testing, software testing, auditing and security management tasks to verify the effectiveness of controls. Every organization should have a defined and actionable security assessment and testing program.
Conduct vulnerability assessments and penetration testing. Vulnerability assessment uses automated tools to detect known vulnerabilities in systems, applications, and networks. These vulnerabilities may include leaked patches, misconfigurations, or faulty code, exposing organizations to security risks. Although penetration testing and vulnerability scanning use the same tools, penetration testing supplements the tools with attack techniques that the assessor uses to try to exploit vulnerabilities and gain system privileges.
Perform software testing to validate code deployed to production. Software testing technology verifies whether code functions meet design requirements and whether there are security flaws. Code reviews use a peer review process to formally or informally validate code before deploying it to production. Interface testing evaluates the interaction between components and users through API testing, user interface testing and physical interface testing.
Understand the differences between static software testing and dynamic software testing. Static testing techniques, such as code review, evaluate the security of software by analyzing source code or compiled programs without running the software. Dynamic testing techniques assess the security of software while it is running and are often the only option for organizations deploying applications developed by others.
Explain the concept of fuzz testing. Fuzz testing uses modified inputs to test how software behaves under unexpected conditions. Mutation fuzz testing generates synthetic inputs by modifying known inputs, which may trigger abnormal software behavior. Pre-generated fuzz testing generates input based on the expected input model, completing the same task as mutation fuzz testing.
Perform security management tasks and supervise the implementation of information security plans. Safety managers must perform a variety of activities. Ensure appropriate controls of the information security program. Log inspection, especially cross-checking of administrator activities, can ensure that the system is not misused. Account management checks ensure that only authorized users retain access to the information system. Backup verification ensures that the organization's support processes are functioning properly. Key performance and risk indicators provide a layered perspective into the effectiveness of your security program.
Conduct or facilitate internal audits and third-party audits. A security audit occurs when a third party evaluates an organization's security controls to protect its information assets. Internal audits are performed by people within the organization for management purposes only. External audits are performed by third-party firms, usually for a business's governing body.
Collect safety process data. Many information security programs native to Anhui Province accept data critical to the security assessment process. These components include account management processes, management reviews and approvals, key performance and risk indicators, backup verification data, training and awareness indicators, and data generated by disaster recovery and business continuity plans.
Review questions
1. Which of the following tools is primarily used to perform network discovery scans? A. nmap B.OpenVAS C. Metasploit Framework D.Isof
2. Adam recently performed a network port scan on a web server running on the organization's network. He scans from the external network to get the scan results from the attacker's perspective. Which of the following results is most likely to trigger an alert? A. 80/open B. 22/filtered C. 443/open D. 1433/open
3. Which of the following factors does not need to be considered when planning a security testing program for a specific system? A. The sensitivity of the information stored in the system B. Difficulty of performing the test C. Eager to try new testing tools D. The attacker’s desire for the system
4. Which of the following is not typically included in a security assessment? A. Vulnerability Scanning B.Risk assessment C. Vulnerability Mitigation D. Threat Assessment
5. Who is the target audience of the security assessment report? A.Management B. Security Auditor C security professionals D.Customer
6 Wendy thinks about using vulnerability scanners in organizations. What is the correct role of a vulnerability scanner? A. Active scanning with intrusion attempts. B. Act as a decoy. C. Locate known security vulnerabilities. D. Baidong will reconfigure the system to a more secure state.
7. Almn scans the server with nnnsp and confirms that port 80 is open on the server. Which tool would provide Alan with the most useful additional information about service deployment and service provider identity? A.SSH B. Web browser C.Telnet D. Ping
8. What port is typically used to receive management connections from an SSH terminal? A. 20 B. 22 C. 25 D. 80
9.Which of the following tests provides the most accurate and detailed information regarding the server's security status? A. Unauthenticated scanning B. Port scanning C. Semi-open scan D. Scanning after identity authentication
10. Which network discovery scan utilizes only the first two steps of the TCP handshake? A. TCP connection scanning B. Xmas scanning C. TCPSYN scan D. TCPACK scan
11. Matthew wants to test the system on the network for SQL injection vulnerabilities. Which of the following tools is best suited for this Task? A. Port scanner B. Network vulnerability scanner C. Network Discovery Scanner D.Web Vulnerability Scanner
12. Badin Bank runs Cheng Yu, a web application that processes e-commerce orders and credit card transactions. Therefore, the bank is subject to PCIDSS. The bank ran a web vulnerability scan on the application and received unsatisfactory results. How often do banks have to rescan applications? A. Only when application changes B. At least once a month C. At least once a year D. No need to rescan
13. Grace is conducting penetration testing on a customer's network and hopes to use tools to automate the exploitation of common vulnerabilities. Which of the following security tools best meets your needs? A. nmap B. Metasploit Framework C.OpenVAS D. Nikto
14. Paul wants to test the application with slight modifications to the previous input. What type of testing is Paul trying to perform? A. Code review B. Application Vulnerability Review C. Mutation fuzz testing D. Pre-generated fuzz testing
15. Bank users may attempt to withdraw funds from their accounts that do not exist. Developers recognize such threats and develop code to protect against them. If the developer has not yet patched the vulnerability, what type of software testing is likely to find it? A. Misuse Case Testing B. SQL injection testing C. Fuzz testing D.Code review
16. What type of interface testing can identify flaws in a program's command line interface? A. Application Programming Interface Testing B. User interface testing C. Physical interface test D. Security interface testing
17. During which penetration test, testers always have access to system configuration information? A. Black box penetration testing B. White box penetration testing C. Gray box penetration testing D. Red box penetration testing
18. Which port is typically opened on systems running unencrypted HTTP servers? A. 22 B. 80 C. 143 D. 443
19. Robrt recently signed a SOC statement with a client and is preparing a report describing his company's evaluation of the suitability and effectiveness of KGB's security controls after completing a six-month assessment. What type of report is Robert preparing? A. Class I Category B.I C Sichuan class D. Category IV
20. What information security management tasks are effective in meeting an organization's data protection requirements? A Account Management B. Backup verification C. Log review D.Key performance indicators