Book 2 Flashcards
__ ___ involves trying to get access to your system from an attackers perspective.
__ __ Is a software program that contains a database of known vulnerabilities against your system to identify weaknesses.
The vulnerability scanner can test the security controls without doing any actual harm. What is this known as?
Passively Testing Security Controls.
In vulnerability scanning, once the results are found, what happens next?
you need to interpret your results.
In __ __ testing, the administrator acts as if they have no prior knowledge of the network.
Black Box testing is also known as __
In __ __ testing, the ethical begins from the premise of knowing something about the network and systems in place.
White Box testing, is also known as ___
Full Disclosure testing
In __ __ testing simulates an outsider is working with someone on the inside who has given them some information.
Gray Box Testing
Grey Box testing is also known as_
Partial disclosure testin.
The __ review assessment examines the ports and protocols used, the rules, segmentation and access control.
___ are indications of a problem currently going on.These are conditions that you must respond to right now.
Slightly below alarms are ___ these are issues that you need to pay attention to but are not bringing the system to its knees at this very moment
___ indicates where problems are occurring.