FORMATIVE 9 Flashcards

(25 cards)

1
Q

Which industry-standard method has created a catalog of known vulnerabilities that provides a score indicating the severity of a vulnerability?

CVSS

CVE

OWASP WSTG

NIST SP 800-115

A

CVSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which vulnerability catalog creates a list of publicly known vulnerabilities, each assigned an ID number, description, and reference?

CVE

CVSS

OWASP WSTG

NIST SP 800-115

A

CVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Match the CVSS metric group with the respective information.

includes exploit code maturity, remediation, level, and report confidence

includes exploitability metrics and impact metrics

includes modified base metrics, confidentiality, integrity and availability requirements.

Temporal metric group -

Base metric group -

Environmental metric group -

A

Temporal metric group - includes exploit code maturity, remediation, level, and report confidence

Base metric group - includes exploitability metrics and impact metrics

Environmental metric group - includes modified base metrics, confidentiality, integrity and availability requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which three items are included in the base metric group used by CVSS? (Choose three.)

attack complexity

integrity impact

modified base metrics

user interaction

availability requirements

remediation level

A

attack complexity

integrity impact

user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which item is included in the environmental metric group used by CVSS?

privileges required

confidentiality requirements

report confidence

availability impact

A

confidentiality requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which item is included in the temporal metric group used by CVSS?

exploit code maturity

integrity impact

modified base metrics

attack vector

A

exploit code maturity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which tool can ingest the results from many penetration testing tools a cybersecurity analyst uses and help this professional produce reports in formats such as CSV, HTML, and PDF?

Dradis

Mimikatz

Nessus

PowerSploit

A

Dradis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Match the description to the respective control category.

Technical Control

Administrative Control

Operational Control

Physical Control

Key rotation -

Input sanitization -

Secure software
development life cycle -

Role-based access
control -

Time-of-day restrictions -

Job rotation -

Video surveillance -

Biometric controls -

A

Key rotation - Technical control

Input sanitization - Technical control

Secure software development life cycle - Administrative control

Role-based access control - Administrative control

Time-of-day restrictions -Operational control

Job rotation - Operational control

Video surveillance - Physical control

Biometric controls - Physical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two items are examples of technical controls that can be recommended as mitigations and remediation of the vulnerabilities found during a pen test? (Choose two.)

multifactor authentication

certificate management

RBAC

mandatory vacations

access control vestibule

A

multifactor authentication

certificate management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A recent pen-test results in a cybersecurity analyst report, including information on process-level remediation, patch management, and secrets management solutions. Which control category is represented by this example?

technical

administrative

operational

physical

A

technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which document provides several cheat sheets and detailed guidance on preventing vulnerabilities such as cross-site scripting, SQL injection, and command injection?

OWASP

CVE

GDPR

CVSS

A

OWASP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A cybersecurity analyst report should contain minimum password requirements and policies and procedures. These are examples that are included in which control category?

technical

administrative

operational

physical

A

administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which control category includes information on mandatory vacations and user training in the cybersecurity analyst report?

technical

administrative

operational

physical

A

operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When creating a cybersecurity analyst report, which control category includes information concerning the access control vestibule?

technical

administrative

operational

physical

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Match the term to the respective description.

a security device triggers an alarm, but there is no malicious activity or actual attack taking place.

malicious activities that are not detected by a network security device.

a successful identification of a security attack or a malicious event

an intrusion detection device identifies an activity as acceptable behavior and the activity is acceptable.

false positive -

false negative -

true negative -

true positive -

A

false positive - a security triggers an alarm, but there is no malicious activity or actual attack taking place

false negative - malicious activity that are not detected by a network security device

true negative - a successful identification of a security attack or a malicious event

true positive - an intrusion detective device identifies an activity as acceptable behavior and the activity as acceptable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which kind of event is also called a “benign trigger”?

false positive

false negative

true positive

true negative

A

false positive

17
Q

What kind of events diminishes the value and urgency of real alerts?

false positives

false negatives

true negatives

true positives

A

false positives

18
Q

Which kinds of events are malicious activities not detected by a network security device?

false positives

false negatives

true negatives

true positives

A

false negatives

19
Q

Which kind of event occurs when an intrusion detection device identifies an activity as acceptable behavior and the activity is acceptable?

false positives

false negatives

true negatives

true positives

A

true negatives

20
Q

Which kind of event is a successful identification of a security attack?

false negative

false positive

true positive

true negative

A

true positive

21
Q

Which example of technical control is recommended to mitigate and prevent vulnerabilities such as cross-site scripting, cross-site request forgery, SQL injection, and command injection?

user input sanitization

process-level remediation

secrets management solution

certificate management

A

user input sanitization

22
Q

Which example of administrative controls enables administrators to control what users can do at both broad and granular levels?

RBAC

secure software development life cycle

policies and procedures

minimum password requirements

23
Q

A document entitled “Building an Information Technology Security Awareness and Training Program” succinctly defines why security education and training are so important for users. The document defines ways to improve the security operations of an organization. Which document is being described?

NIST SP 800-50

NIST SP 800-115

OWASP WSTG

CVSS

A

NIST SP 800-50

24
Q

How is the score that CVSS provides interpreted?

scores are rated from 0 to 100, with 100 being the most severe

scores are rated from 0 to 100, with 0 being the most severe

scores are rated from 0 to 10, with 10 being the most severe

scores are rated from 0 to 10, with 0 being the most severe

A

scores are rated from 0 to 10, with 10 being the most severe

25
What control category does system hardening belong to? technical administrative operational physical
technical