Module 23 Endpoint Vulnerability Assessment Flashcards

1
Q

What is network profiling?

A

Session duration, total throughput, typical traffic type, critical asset address space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a server profile?

A

Listening ports, logged in users and accounts, service accounts, software environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Network Anomaly Detection?

A

Network behavior - large amount of data such as packet flow, features of the packet, etc.
- Big data analytics techniques can be used to analyze data and detect variations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does network vulnerability testing include?

A

Risk analysis, vulnerability assessment and penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is penetration testing?

A

Use of hacking techniques and tools to penetrate network defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is vulnerability assessments?

A

Patch management, host scans, port-scanning and other scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is risk analysis

A

Individuals conduct comprehensive analysis of impacts of attacks on core company assets and functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is CVSS

A

Common Vulnerability Scoring Sys is a risk assessment tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the CVSS Metric Groups

A

Base, temporal and environmental metric group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the base Metric group

A

Represents the characteristics of a vulnerability that are constant over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Temporal Metric

A

Measures the characteristics of a vuln that may change over time, but not environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is envir metric group

A

Measures aspects of a vuln that are rooted in a specific organizations envir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is considered a high severity rating?

A

Any vuln that exceeds 3.9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some vulnerability information sources?

A

NVD - National Vulnerability Database , CVE (Common Vulnerabilities and Exposures),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is risk management?

A

Selection and Specification of security controls for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the ways to respond to risk?

A

Risk tolerance, risk reduction, risk sharing and risk retention

17
Q

What are the steps in the vulnerability management life cycle?

A

Discover, prioritize assets, assess,

18
Q

What is the discover process?

A

Develop a network baseline - identify security vulnerabilities

19
Q

What is prioritizing assets?

A

Categorize assets into group or business units and assign a business value

20
Q

What is assessing?

A

Determine a baseline risk profile to eliminate risks based on asset criticality, threats, vulnerabilities and asset classification

21
Q

What is report?

A

Measure the level of business risk associated with your assets according to security policies. Document a security plan, monitor activity, describe vuln

22
Q

What is remediate

A

Prioritize according to business risk and add vuln in order of risk

23
Q

What is verify

A

Verify that threats have been eliminated

24
Q

What is the NIST cybersecurity framework?

A

Set of standards designed to integrate existing standards, guidelines and practices to help manage and reduce risk

25
Q

What are some of the functions

A

Identify, Protect, Detect, Respond and Recover

26
Q

What are some tools for asset management?

A

Automation of inventory, identification of non-compliant authorized assets, specify desired state for those devices using policies, plans in the org information security plan…remediation or acceptance of device state

27
Q

Provide an example of asset management - specifying a desire state

A

Desired state - windows env, we have active directory, within ad we have group policies which are an articulation of a desired state

28
Q

Mobile device management - what is out there?

A

Increase in device management - cisco Meraki Systems Manager which can configure, monitor and update mobile clients

29
Q

What is configuration management?

A

Maintaining integrity of systems, through control of the processes for changing, initializing and monitoring the configs of those products

30
Q

What are some configuration tools?

A

Puppet, Chef, Ansible, SaltStack

31
Q

What is enterprise patch management?

A

Involves all aspects of software patching, identifying required patches, acquiring and installing.

32
Q

What are some Patch Management Techniques

A

Agent based - requires a software agent to be running on each host. Communicates with patch management server - preferred for mobile DEVICES!

33
Q

What is passive network monitoring?

A

Devices requiring patching are identified through monitoring of traffic on a network.

34
Q

What is a ISMS within Security Management Systems?

A

Information Security Management System consists of a management framework to identify, analyze and address information security risks.

35
Q

ISO-27001 - what are the 4 pillars

A

Plan, Do, Check, Act

36
Q
A