Vulnerability Assessment Flashcards

1
Q

What does the ‘Remediationstage of Vulnerability Assessment entail?

A

Remediation is the process of applying fixes on vulnerable systems in order to reduce the impact and severity of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the ‘Verificationstage of Vulnerability Assessment entail?

A

This phase provides clear visibility into the firm and allows the security team to check whether all the previous phases have been perfectly employed or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the ‘Risk Assessmentstage of Vulnerability Assessment entail?

A

All serious uncertainties that are associated with the system are assessed and prioritized, and remediation is planned to permanently eliminate system flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the ‘Monitoringstage of Vulnerability Assessment entail?

A

Organizations need to performed regular monitoring to maintain system security. Continuous monitoring identifies potential threats and any new vulnerabilities that have evolved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is CVSS?

A

CVSS (the Common Vulnerability Scoring System) is a published standard that provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the correct order of steps in vulnerability assessment?

A
  1. Risk Assessment
  2. Remediation
  3. Verification
  4. Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the correct order of steps in the vulnerability management lifecycle?

A
  1. Identify Assets & Create Baseline
  2. Vulnerability Scan
  3. Risk Assessment
  4. Remediation
  5. Verification
  6. Monitor
  7. Repeat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 metrics which establish a CVSS score?

A

Base Metrics, Environmental Metrics, and Temporal Metrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Internal Assessment?

A

An internal assessment involves scrutinizing the internal network to find exploits and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Distributed Assessment?

A

This type of assessment, employed by organizations that possess assets like servers and clients at different locations, involves simultaneously assessing the distributed organization assets, such as client and server applications, using appropriate synchronization techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Network-based Assessment?

A

These assessments discover network resources and map the ports and services running to various areas on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Credentialed Assessment?

A

In this type of assessment, the ethical hacker possesses the credentials of all machines present in the assessed network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a host-based assessment?

A

A host-based assessment involves looks at the vulnerabilities of the devices on a particular network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an active assessment?

A

An active assessment involves using a network scanner to look for hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a passive assessment?

A

A passive assessment involves sniffing packets in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a wireless network assessment?

A

A wireless network assessment looks for vulnerabilities in the wireless network

17
Q

What is a Product-Based Vulnerability Assessment Solution?

A

A Product-Based Vulnerability Assessment is a solution that is installed either on a private or non-routable space or on the Internet-addressable portion of an organization’s network.

18
Q

What is a Tree-Based Vulnerability Assessment Solution?

A

In a tree-based assessment, the auditor (parent) selects different strategies for each machine or component (child nodes) of the information system. This approach relies on the administrator to provide a starting piece of intelligence and then to start scanning continuously without incorporating any information found at the time of scanning

19
Q

What is a Service-Based Vulnerability Assessment Solution?

A

Service-based solutions are offered by third parties, such as auditing or security consulting firms. Some solutions are hosted inside the network, while others are hosted outside the network

20
Q

What is an Inference-Based Vulnerability Assessment Solution?

A

In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine

21
Q

What are Depth Assessment Tools?

A

Depth assessment tools are used to discover and identify previously unknown vulnerabilities in a system. Generally, tools such as fuzzers, which provide arbitrary input to a system’s interface, are used to identify vulnerabilities to an unstable depth

22
Q

What are Host-Based Vulnerability Assessment Tools?

A

The host-based scanning tools are appropriate for servers that run various applications, such as the Web, critical files, databases, directories, and remote accesses. These host-based scanners can detect high levels of vulnerabilities and provide required information about the fixes (patches).

23
Q

What are Scope Assessment Tools?

A

Scope assessment tools provide an assessment of the security by testing vulnerabilities in the applications and operating system. These tools provide standard controls and a reporting interface that allows the user to select a suitable scan.

24
Q

What are Application-Layer Vulnerability Assessment Tools?

A

Application-layer vulnerability assessment tools are designed to serve the needs of all kinds of operating system types and applications. Various resources pose a variety of security threats and are identified by the tools designed for that purpose

25
Q

What are Network-Based Scanners?

A

Network-based scanners are those that interact only with the real machine where they reside and give the report to the same machine after scanning

26
Q

What are Agent-Based Scanners?

A

Agent-based scanners reside on a single machine but can scan several machines on the same network

27
Q

What are Proxy Scanners?

A

Proxy scanners are the network-based scanners that can scan networks from any machine on the network

28
Q

What are Cluster Scanners?

A

Cluster scanners are similar to proxy scanners, but they can simultaneously perform two or more scans on different machines in the network