Domain 6 Test Notes Flashcards

(26 cards)

1
Q

Focus on service organization controls relevant to internal control over financial reporting. For internal use and available to the organization

A

System and Organization Controls 1 (SOC1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assess the organization’s controls that affect the security (CIA), and privacy of information stored in a system. Results are confidential and normally only shared outside the organization under NDA

A

System and Organization Controls 2 (SOC2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assess the organization’s control that affects the security (CIA), and privacy of information stored in a system but the results are intended for public disclosure

A

System and Organization Controls 3 (SOC3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reports provide the auditor’s opinion on the description provided by management and the suitability of the design of the controls. Only cover a specific point and time. This can be thought of as a documentation review.

A

SOC Type I Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reports go further and also provide the auditor’s opinion on the operating effectiveness of the controls. The auditor actually confirms that the controls are functioning properly. Covers an extended period of time at least 6 months. This can be viewed as a traditional audit because they will be verifying that the controls function properly.

A

SOC Type II Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provides the attackers with detailed information about the system they target like IP addresses and system version number. This allows more complete test coverage and simulates an insider threat.

A

White/Crystal Box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some information is provided to testers, but they are also charged with finding other information.

A

Gray Box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Does not provide attackers with any information prior to the attack. Simulates an external attacker trying to gain access to information about business and technical environment before engaging in an attack.

A

Black Box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Requirements for bodies providing audit and certifications of information security management systems.

A

ISO/IEC 27006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Discovery or Reconnaissance
  2. Scanning and Probing
  3. Exploitation
  4. Post Exploitation
    5 Reporting
A

Pen Testing Phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Gather information regarding the target(s)

A

Discovery or Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Utilize gathered information to probe for vulnerabilities and identify entry points

A

Scanning and Probing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Utilize approved methods to exploit vulnerabilities and attempt to gain access

A

Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Continue the attack by attempting exploits using access gained

A

Post Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Document and present report on actions taken, exploits achieved, suggested remediations

A

Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tool used to scan a network or system for a list of predefined vulnerabilities such as system misconfiguration, outdated software, or lack of patching

A

Vulnerability Scanning

17
Q
  1. Identification
  2. Analysis
  3. Responses
  4. Validation
  5. Reporting
A

Vulnerability Lifecycle

18
Q

Performed by the organization’s internal audit staff where the goal is to assess internal controls, identify areas for improvement, ensure compliance with internal policies

A

Internal Audit

19
Q

performed by someone outside the organization where the goal is to provide an independent assessment of compliance with corporate policies and/or regulatory standards.

A

External Audit

20
Q

Performed by an independent outside auditing firm where the goal is to ensure compliance with specific requirements, assess performance against external standards

A

Third-Party Audit

21
Q

Provides a naming system for describing security vulnerabilities

A

Common Vulnerabilities and Exposures (CVE)

22
Q

Provides a standardized scoring system for describing the severity of security vulnerabilities.

A

Common Vulnerability Scoring System (CVSS)

23
Q

Automated simulated attacks by ethical hackers or dedicated ‘red teams’ to imitate real-world adversary tactics and discover weaknesses before a threat actor finds them. To assess your ability to detect, respond to, and remediate real attacks. They provide hands-on training to your security teams in the best ways to counter
threats

A

Breach Attack Simulations (BAS)

24
Q

A common standard used by auditors performing assessments of service organizations with the intent of allowing the organization to conduct an external assessment instead of multiple 3rd party assessments and then sharing the resulting report with customers and potential customers. Example: cloud providers

A

Statement of Standards for Attestation Engagements document 18

25
A preliminary type of testing used to verify the stability and basic functionality of a new software build
Smoke Test
26
It involves the re-running existing tests after making changes to software to ensure that previously working functionality hasn’t been broken by the new changes. It helps catch unintended side effects of code changes and verifies that new features don’t disrupt existing functionality.
Regression Test