CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

484 use case testing – vulnerability scans


polymorphic viruses, 396
propagation, 198
stealth, 397
vital records programs, 22
VLANs (virtual LANs), 321,
357, 431
hopping, 353
VM escape, 97
VMWare environment, 251
voice pattern recognition, 104, 358
VoIP (Voice over IP), 299, 437
attacks, 235
VoIP phones, 94, 419
volatile memory, 228
VPNs (virtual private networks), 244,
321, 392
authentication, protocols, 82
IPsec, 33, 330
non-IP protocol, 247
protocols, 92
remote users, 83
vulnerabilities, 325
charting, 138
confidence levels, 181
information sources, 157
message boards, 183 –184
not found by scanner, 149
patches, 184
remediating, 139, 374
risk and, 453
SCAP and, 139
TOC/TOU attacks, 186
wireless networks, 89
zero-day, 130, 162, 226
vulnerability scans, 25, 134, 135, 147,
372, 380
active wireless, 130
Bluetooth, 136
configuration information, 145
coverage, 148
Nikto, 226–227
remote access vulnerability, 76
response, 143

use case testing, 432
user accounts
creation, 266
enrollment, 435
registration, 435
user awareness, 353
user interfaces, constrained, 218, 412
usernames, 439
identification and, 325
Kerberos, 107–108
users, traveling, 113
USPTO (United States Patent and Trademark
Office), 320

V
vacation, 383
mandatory, 167, 388
validation, 334
input validation, 249, 342, 397, 403,
417, 428
client-side, 399
Van Eck radiation, 65
VAST threat model, 24, 326
verification, 209, 342
identity proofing, 408
patches, 274
virtual machines, 389, 428
cut and paste, 97, 355
escape, 355
virtualization, 54, 73, 153
access control module, 159
cloud types, 156
full guest operating systems, 169
testing and, 169
visibility risks, 355
viruses, 406
encrypted, 397
hiding, 185
macro, 180, 395
multipartite, 397, 404
polymorphic, 397
Free download pdf