1/12
These flashcards cover key concepts related to software testing, website vulnerability, and security assessments from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is a primary difference between software testing and website security assessments?
Software testing is a broader set of procedures, while website security assessments focus specifically on security vulnerabilities.
What are the four elements that typically make up a website?
Web server software 2. A hardware server and operating system 3. A software application 4. A database
What is the purpose of performing an initial discovery on a targeted website?
To identify components of the website platform that need to be tested or attacked.
What is a ping sweep?
A method of using the ping utility across a range of IP addresses to identify active hosts.
What is the Nmap utility primarily used for?
Network mapping, including ping sweeping, port scanning, and operating system detection.
How can operating system fingerprinting help in security assessments?
It helps in identifying the OS to determine tools and techniques for further assessment.
What is Nessus?
A popular vulnerability scanning tool that tests systems for vulnerabilities and compliance.
What is cross-site scripting (XSS)?
A vulnerability that allows attackers to inject scripts into web pages viewed by other users.
What does PCI DSS stand for?
Payment Card Industry Data Security Standards, which are security standards for organizations that handle credit cards.
What is penetration testing?
A method of testing a system's security by simulating an attack to identify vulnerabilities.
What is one of the main parts of a vulnerability assessment report?
An executive summary presenting the key findings and recommendations.
Why is it advisable to use multiple tools for security assessments?
Different tools may detect different vulnerabilities, providing a more comprehensive assessment.
What is the significance of distinguishing between authenticated and unauthenticated scans?
Authenticated tests provide a complete view of security risks, while unauthenticated scans may miss certain vulnerabilities.