Module 23 Endpoint Vulnerability Assessment Flashcards

1
Q

What is network profiling?

A

Session duration, total throughput, typical traffic type, critical asset address space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a server profile?

A

Listening ports, logged in users and accounts, service accounts, software environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Network Anomaly Detection?

A

Network behavior - large amount of data such as packet flow, features of the packet, etc.
- Big data analytics techniques can be used to analyze data and detect variations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does network vulnerability testing include?

A

Risk analysis, vulnerability assessment and penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is penetration testing?

A

Use of hacking techniques and tools to penetrate network defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is vulnerability assessments?

A

Patch management, host scans, port-scanning and other scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is risk analysis

A

Individuals conduct comprehensive analysis of impacts of attacks on core company assets and functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is CVSS

A

Common Vulnerability Scoring Sys is a risk assessment tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the CVSS Metric Groups

A

Base, temporal and environmental metric group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the base Metric group

A

Represents the characteristics of a vulnerability that are constant over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Temporal Metric

A

Measures the characteristics of a vuln that may change over time, but not environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is envir metric group

A

Measures aspects of a vuln that are rooted in a specific organizations envir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is considered a high severity rating?

A

Any vuln that exceeds 3.9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some vulnerability information sources?

A

NVD - National Vulnerability Database , CVE (Common Vulnerabilities and Exposures),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is risk management?

A

Selection and Specification of security controls for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the ways to respond to risk?

A

Risk tolerance, risk reduction, risk sharing and risk retention

17
Q

What are the steps in the vulnerability management life cycle?

A

Discover, prioritize assets, assess,

18
Q

What is the discover process?

A

Develop a network baseline - identify security vulnerabilities

19
Q

What is prioritizing assets?

A

Categorize assets into group or business units and assign a business value

20
Q

What is assessing?

A

Determine a baseline risk profile to eliminate risks based on asset criticality, threats, vulnerabilities and asset classification

21
Q

What is report?

A

Measure the level of business risk associated with your assets according to security policies. Document a security plan, monitor activity, describe vuln

22
Q

What is remediate

A

Prioritize according to business risk and add vuln in order of risk

23
Q

What is verify

A

Verify that threats have been eliminated

24
Q

What is the NIST cybersecurity framework?

A

Set of standards designed to integrate existing standards, guidelines and practices to help manage and reduce risk

25
What are some of the functions
Identify, Protect, Detect, Respond and Recover
26
What are some tools for asset management?
Automation of inventory, identification of non-compliant authorized assets, specify desired state for those devices using policies, plans in the org information security plan...remediation or acceptance of device state
27
Provide an example of asset management - specifying a desire state
Desired state - windows env, we have active directory, within ad we have group policies which are an articulation of a desired state
28
Mobile device management - what is out there?
Increase in device management - cisco Meraki Systems Manager which can configure, monitor and update mobile clients
29
What is configuration management?
Maintaining integrity of systems, through control of the processes for changing, initializing and monitoring the configs of those products
30
What are some configuration tools?
Puppet, Chef, Ansible, SaltStack
31
What is enterprise patch management?
Involves all aspects of software patching, identifying required patches, acquiring and installing.
32
What are some Patch Management Techniques
Agent based - requires a software agent to be running on each host. Communicates with patch management server - preferred for mobile DEVICES!
33
What is passive network monitoring?
Devices requiring patching are identified through monitoring of traffic on a network.
34
What is a ISMS within Security Management Systems?
Information Security Management System consists of a management framework to identify, analyze and address information security risks.
35
ISO-27001 - what are the 4 pillars
Plan, Do, Check, Act
36