Section 22 Vulnerability Management Flashcards

1
Q

Seeks to identify any issue in a network, application, database, or other systems prior to it being used that might compromise the system.

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Practice of finding and mitigating the vulnerabilities in computers and networks.

A

Vulnerability Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs when an attacker moves onto another workstation or user account.

A

Pivot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ability of an attacker to maintain a foothold inside the compromised network.

A

Persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exercise that uses an incident scenario against a framework of controls or a red team.

A

Tabletop Exercise (TTX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A test that uses active tools and security utilities to evaluate security by simulating an attack on a system to verify that a threat exists, actively test it, bypass security controls, and then finally exploit vulnerabilities on a given system.

A

Penetration Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The hostile or attacking team in penetration test or incident response exercise.

A

Red Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The defensive team in a penetration test or incient response exercise.

A

Blue Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Staff administering, evaluating, and supervising a penetration test or incident response exercise.

A

White Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A standard designed to regulate the transfer of secure public information across networks and the internet utilizing any security tools and services available.

A

Open Vulnerability and Assessment Language (OVAL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An XML schema used to define and describe the information being created by OVAL to be shared among the various programs and tools.

A

OVAL Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A reference developed to ensure the information passed around by these programs complies with the OVAL schemes and definitions used by the OVAL language.

A

OVAL Interpreter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discovery and documentation of physical and logical connectivity that exists in the network.

A

Network Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technique that identifies threats on the network without exploiting them.

A

Vulnerability Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technique used to gain information about servers and inventory the systems or services.

A

Banner Grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The process of finding and investigating other computers on the network by analyzing the network traffic or capturing the packets being spent.

A

Network Sniffing

17
Q

Software tool that allows for the capture, reassembly and analysis of packets from the network.

A

Protocol Analyzer

18
Q

A tool used to test the strength of your passwords to ensure your password policies are being followed.

A

Password Analysis

19
Q

Uses comparative analysis to break passwords and systematically continues guessing until the password is determined.

A

Password Cracker

20
Q

Occurs when a weak password is simply figured out by a person.

A

Password Guessing

21
Q

Method where a program attempts to guessing the password by using a list of possible passwords.

A

Dictionary Attack

22
Q

Method where a program attempts to try every possible combination until it cracks the password.

A

Brute Force Attacks

23
Q

Comparing a precomputed encrypted password to a value in a lookup table.

A

Cryptanalysis Attack

24
Q

List of precomputed valued used to more quickly break a password since values don’t have to be calculated for each password being guessed.

A

Rainbow Table

25
Q

Attempt to crack a password by threating or causing a person physical harm in order to make them tell you the password.

A

Rubber Hose Attack