1: 7 Vulnerability Scanning Flashcards

(32 cards)

1
Q

What are the four steps of the vulnerability patching process?

A

1) Company learns of vulnerability
2) Developers analyze issue and develop patch
3 Company releases patch to customers
4) Customers apply patch to remediate vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability Management

A

Detects, remediates, and reports vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the different types of vulnerability requirements an organization must follow?

A

Corporate policy, regulatory requirements, system security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PCI DSS

A

Credit Card Management requirement documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FISMA - NIST 853

A

Government requirement documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Vulnerability Scan

A

Probes devices for security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application Scan

A

Tests code running on an organization’s devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web Application Scan

A

Probes for risks such as SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best way to assess an organization’s vulnerabilties?

A

Pairing scans with configuration and log reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three ways to prioritize assets to be scanned?

A

Impact, Likelihood, Criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Impact

A

Highest data classification handled by system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Likelihood

A

Network exposure, what services are exposed to outside world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Criticality

A

Impact the system has on business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the ways an organization can configure a vulnerability scan

A

Target applications, schedule for certain groups, configure types of network pings, target ports, protocols to follow, testing accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a vulnerability scan plugin

A

The ability to test for one specific vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Scanner in the DMZ

A

Unrestricted access to webserver as it doesn’t have to pass through firewall (most clear view)

17
Q

Scanner on the network

A

Firewall may block some rules for scanner

18
Q

Scanner on the internet

A

Firewall will block most, scanner will see fewest vulnerabilities (attackers view)

19
Q

Agent-based Scans

A

Reaches out over network to probe

20
Q

Server-based Scans

A

Scanners installed on each target device and then report to system (more complex)

21
Q

Credentialed Scanning

A

Using passwords to log into systems (read only access, not admin credentials)

22
Q

SCAP

A

Security Content Authentication protocol - led by NIST - format for talking about issues

23
Q

CVSS

A

Common Vulnerability Scoring System - widely used to evaluate severity of vulnerability

24
Q

CCE

A

Common Configuration Enumeration - Consistent language when talking about system configuration

25
CPEs
Common Platform Enumeration - Consistent language when talking about platform configuration
26
CVE
Common Vulnerability Enumeration - Consistent language when talking about vulnerabilities
27
XCCDF
Extensible Configuration Checklist Description Format - language for creating and sharing checklists
28
OVAL
Open Vulnerability and Assessment Language - describe testing procedures in a programmatic fashion
29
What is the scoring of the CVSS
10-point scale - based on 8 metrics
30
What are the 8 metrics used to score the CVSS
UI User Interaction, Privileges Required Metric, Attack Complexity, Attack Vector, Confidentiality, Integrity, Availability, Scope
31
How should the results of a scan be prioritized?
Vulnerability severity, system criticality, information sensitivity, remediation difficulty, system exposure
32
Scan validation
Correlate scan results with other sources of information i.e. Industry Standards, Technical Information Sources, Trend Analysis