2.0 Vulnerability Management Flashcards

(110 cards)

1
Q

Map scans

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Device fingerprinting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scheduling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operations

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Performance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sensitivity levels

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Segmentation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Regulatory requirements

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internal vs. external scanning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Agent vs. agentless

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credentialed vs. non-credentialed

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passive vs. active

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Static vs. dymanic

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reverse engineering

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fuzzing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Operational technology (OT)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Industrial control systems (ICS)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Supervisory control and data acquisition (SCADA)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Security baseline scanning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Payment Card Industry Data Security Standard (PCI DSS)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Center for Internet Security (CIS) benchmarks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Open Web Application Security Project (OWASP)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

International Organization for Standardization (ISO) 27000 series

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Angry IP Scanner

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Maltego
26
Burp Suite
27
Zed Attack Proxy (ZAP)
28
Arachni
29
Nikto
30
Nessus
31
OpenVAS
32
Immunity debugger
33
GNU debugger (GDB)
34
Nmap
35
Metasploit framework (MSF)
36
Recon-ng
37
Scout Suite
38
Prowler
39
Pacu
40
Common Vulnerability Scoring System (CVSS) Interpretation
41
Attack vectors
42
Attack complexity
43
Privileges required
44
User interaction
45
Scope
46
Impact
Confidentiality Integrity Availability
47
True/false positives
48
True/false negatives
49
Internal
50
External
51
Isolated
52
Exploitability/weaponization
53
Asset value
54
Zero-day
55
Cross-site scripting
56
Reflected
57
Persistent
58
Buffer overflow
59
Integer overflow
60
Heap overflow
61
Stack overflow
62
Data poisoning
63
Broken access control
64
Cryptographic failures
65
Injection flaws
66
Cross-site request forgery
67
Directory traversal
68
Insecure design
69
Security misconfiguration
70
End-of-life or outdated components
71
Identification and authentication failures
72
Server-side request forgery
73
Remote code execution
74
Privilege escalation
75
Local file inclusion (LFI)/remote file inclusion (RFI)
76
Compensating control
77
Managerial
78
Operational
79
Technical
80
Preventative
81
Detective
82
Responsive
83
Corrective
84
Testing
85
Implementation
86
Rollback
87
Validation
88
Maintenance windows
89
Exceptions
90
Accept
91
Transfer
92
Avoid
93
Mitigate
94
Policies, governance, and service level objectives (SLO)
95
Prioritization and escalation
96
Edge discovery
97
Passive discovery
98
Security controls testing
99
Penetration testing and adversary emulation
100
Bug bounty
101
Attack surface reduction
102
Input validation
103
Output encoding
104
Session management
105
Authentication
106
Data protection
107
Parameterized queries
108
Secure software development life cycle (SDLC)
109
Threat modeling
110