Enpoint Vulnerability Quiz Flashcards

1
Q

In profiling a server, what defines what an application is allowed to do or run on a server?

A

Service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In network security assessments, which type of test is used to evaluate the risk posed by vulnerabilities to a specific organization including assessment of the likelihood of attacks and the impact of successful exploits on the organization?

A

Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a network baseline is being established for an organization, which network profile element indicates the time between the establishment of a data flow and its termination?

A

Session duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of evaluation includes the assessment of the likelihood of an attack, the type of threat actor likely to perpetrate such an attack, and what the consequences could be to the organization if the exploit is successful?

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cybersecurity analyst is performing a CVSS assessment on an attack where a web link was sent to several employees. Once clicked, an internal attack was launched. Which CVSS Base Metric Group Exploitability metric is used to document that the user had to click on the link in order for the attack to occur?

A

User Interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which metric class in the CVSS Basic Metric Group identifies the impacts on confidentiality, integrity, and availability?

A

impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which metric in the CVSS Base Metric Group is used with an attack vector?

A

the proximity of the threat actor to the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement describes the threat-vulnerability (T-V) pairing?

A

It is the identification of threats and vulnerabilities and the matching of threats with vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In addressing an identified risk, which strategy aims to shift some of the risk to other parties?

A

Risk Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which step in the Vulnerability Management Life Cycle categorizes assets into groups or business units, and assigns a business value to asset groups based on their criticality to business operations?

A

prioritise assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an action that should be taken in the discovery step of the vulnerability management life cycle?

A

developing a network baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly