1.7 Vulnerability Scans Flashcards

1
Q

What do you need to remember about credentialed vs non-credentialed vulnerability scans?

A

Credentialed means the scanner has authenticated to the to the device. Any un-credentialed scan would only be able to gain information available without authentication, meaning they cant see internal details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a credentialed scan emulate?

A

An attack from an insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a vulnerability scanning tool that we need to know for Security+?

A

Nessus

Nmap for network discovery of networks, services, OS info, ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the vulnerability scanner detect issues?

A

Signature based detection. It will also detect a lack of security controls such as no firewall, antivirus, guest accounts, open files, outdated software.

It will also point out vulnerabilities for informational purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What types of scan do vulnerability scanners provide?

A

Applications, Web Apps, Network Scans (misconfigured firewalls, open ports, vulnerable devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Note for test

A

Vulnerabilities can be cross referenced online, and some can not be definitively identified so you will need to investigate yourself by testing the issue.

You can always do audits/configuration reviews without a vulnerability scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are possible actions to take if you get false positives or false negatives?

A

Make sure your scanner is up to date, or work with the vulnerability detection manufacturer to make sure they are aware of something they don’t know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly