Chapter 8: Using Risk Management Tools Flashcards

1
Q

A ____ is the likelihood that a threat will exploit a vulnerability.

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ____ is a potential danger that can compromise confidentiality, integrity, or availability of data or a system.

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____ is a weakness.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ refers to the magnitude of harm that can be caused if a threat exercises a vulnerability.

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ ____ help an organization identify and categorize threats.

A

Threat assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An____ threat assessment evaluates the likelihood of an environmental threat, such as a natural disaster, occurring.

A

environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ threat assessments evaluate threats from humans.

A

Manmade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ threat assessments evaluate threats from within an organization.

A

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ threat assessment evaluates threats from outside an organization.

A

External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _____ is a flaw or weakness in software or hardware, or a weakness in a process that a threat could exploit, resulting in a security breach.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk management attempts to reduce risk to a level that an organization can accept, and the remaining risk is known as ____ risk.

A

residual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You can avoid a risk by not providing a service or participating in a risky activity. Purchasing insurance, such as fire insurance, transfers the risk to another entity. Security controls mitigate, or reduce, risks. When the cost of a control outweighs a risk, it is common to ____ ___ ____.

A

accept the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ___ _____ quantifies or qualifies risks based on different values or judgments. It starts by identifying asset values and prioritizing high-value items.

A

risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ risk assessments use numbers, such as costs and asset values.

A

Quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ___ ___ ___ is the cost of any single loss.

A

single loss expectancy (SLE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ____ __ ___ ____ indicates how many times the loss will occur annually.

A

annual rate of occurrence (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You can calculate the annual loss expectancy (ALE) as ___ x ____

A

SLE × ARO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____risk assessments use judgments to prioritize risks based on likelihood of occurrence and impact. These judgments provide a subjective ranking.

A

Qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ____ ____ is a detailed document listing information about risks. It typically includes risk scores along with recommended security controls to reduce the risk scores.

A

risk register

20
Q

A ____ ____ assessment evaluates a supply chain needed to produce and sell a product. It includes raw materials and all the processes required to create and distribute a finished product.

A

supply chain

21
Q

A ___ ___ scans systems for open ports and attempts to discover what services and protocols are running.

A

port scanner

22
Q

____ ____ identifies the IP addresses of hosts within a network.

A

Network mapping

23
Q

____ scanners expand on network mapping. They identify the operating system running on each host. They can also identify services and protocols running on each host.

24
Q

____ scanners can detect rogue access points (APs) in a network. Many can also crack passwords used by the APs.

25
____ _____ queries remote systems to detect their operating system, along with services, protocols, and applications running on the remote system.
Banner grabbing
26
_____ scanners passively test security controls to identify vulnerabilities, a lack of security controls, and common misconfigurations. They are effective at discovering systems susceptible to an attack without exploiting the systems.
Vulnerability
27
A ___ positive from a vulnerability scan indicates the scan detected a vulnerability, but the vulnerability doesn’t exist.
false
28
_____ scans run under the context of an account and can be more accurate than non- credentialed scans, giving fewer false positives.
Credentialed
29
_____ testers should gain consent prior to starting a penetration test. A rules-of- engagement document identifies the boundaries of the test.
Penetration
30
A ____ ___ is an active test that attempts to exploit discovered vulnerabilities. It starts with a vulnerability scan and then bypasses or actively tests security controls to exploit vulnerabilities.
penetration test
31
_____ ____ gathers information from open-source intelligence. Active reconnaissance uses scanning techniques to gather information.
Passive reconnaissance
32
After initial exploitation, a penetration tester uses ____ ____ techniques to gain more access.
privilege escalation
33
____ during a penetration test is the process of using an exploited system to access other systems.
Pivoting
34
In____ box testing, testers perform a penetration test with zero prior knowledge of the environment.____ box testing indicates that the testers have full knowledge of the environment, including documentation and source code for tested applications. ____ box testing indicates some knowledge of the environment.
black White Gray
35
Scans can be either intrusive or non-intrusive.____ testing is intrusive (also called invasive) and can potentially disrupt operations.____ testing is non-intrusive (also called non-invasive).
Penetration | Vulnerability
36
____frameworks store information about security vulnerabilities. They are often used by penetration testers (and attackers) to detect and exploit software.
Exploitation
37
___ ____ (sniffers) can capture and analyze data sent over a network. Testers (and attackers) use protocol analyzers to capture cleartext data sent across a network.
Protocol analyzers
38
Administrators use protocol analyzers for troubleshooting communication issues by inspecting protocol____ to detect manipulated or fragmented packets.
headers
39
Captured_____ show the type of traffic (protocol), source and destination IP addresses, source and destination MAC addresses, and flags.
packets
40
_____is a command-line protocol analyzer. Captured packet files can be analyzed in a graphical protocol analyzer such as Wireshark.
Tcpdump
41
____is a sophisticated network scanner run from the command line. ____ is a command-line tool used to remotely administer servers; it can also be used for banner grabbing.
Nmap | Netcat
42
Logs record events and by monitoring logs, administrators can detect event anomalies. Security logs track ___ and ___ activity on systems. System logs identify when services ___ and ___.
logon and logoff | start and stop
43
Firewall and router logs identify the ___ and ____ of traffic.
source and destination
44
A ____ ____ ____ ____ system can aggregate and correlate logs from multiple sources in a single location. It also provides continuous monitoring and automated alerting and triggers.
security information and event management (SIEM)
45
_____ security monitoring helps an organization maintain its security posture, by verifying that security controls continue to function as intended.
Continuous
46
____ auditing records user activities. These auditing reviews examine user activity.
User
47
____ auditing reviews help ensure that users have only the rights and permissions they need to perform their jobs, and no more.
Permission