Answer:
The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology
, extended analysis of all stages
Explanation:
Solution
Penetration testing has several methodologies which include :OSSTMM and PTES
The comparison between OSSTMM and PTES is stated as follows:
OSSTMM:
Security assessment methodology
More Theoretical
Metrics based
PTES
:
Technology oriented
Penetration testing methodology
Extended analysis of all stages
Now,
There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)
- Pre-engagement Interactions
Now,
The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.
The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.
Six areas are covered by OSSTMM which are:
-
Internet technology security
Answer:
The answer is below
Explanation:
An OLTP (Online transaction processing) database is a database that allows for quick transaction processing. It involves inserting, deleting, updating data in the database.
OLTP has many drawbacks like if the system fails, all transactions are going to have problems. Also, since multiple users are allowed to access the data, it makes it prone to hackers.
The solution to the problems associated to the OLTP database is the OLAP (online analytical processing) database.
The OLAP systems allow users to analyze database information from multiple database systems at one time thereby allowing analysis for business decisions.
Answer:
- limitation and control of network ports, protocols and services.
- Continuous vulnerability assessment and remediation.
Explanation:
The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.
The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.
Answer:
The answer is "False"
Explanation:
The data link layer is the protocol layer within a program, which controls data movement into a physical wireless connection. This layer is a second layer, that is also known as a collection of communications applications.
- The server network, in which many clients request, and receive service from a centralized server.
- This system provides an interface, that enables a user to request server services and view the server returns results, that's why it is wrong.
Answer:
There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.
These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.
Explanation: