1: 7 Vulnerability Scanning Flashcards

1
Q

What are the four steps of the vulnerability patching process?

A

1) Company learns of vulnerability
2) Developers analyze issue and develop patch
3 Company releases patch to customers
4) Customers apply patch to remediate vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability Management

A

Detects, remediates, and reports vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the different types of vulnerability requirements an organization must follow?

A

Corporate policy, regulatory requirements, system security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PCI DSS

A

Credit Card Management requirement documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FISMA - NIST 853

A

Government requirement documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Vulnerability Scan

A

Probes devices for security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application Scan

A

Tests code running on an organization’s devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web Application Scan

A

Probes for risks such as SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best way to assess an organization’s vulnerabilties?

A

Pairing scans with configuration and log reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three ways to prioritize assets to be scanned?

A

Impact, Likelihood, Criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Impact

A

Highest data classification handled by system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Likelihood

A

Network exposure, what services are exposed to outside world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Criticality

A

Impact the system has on business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the ways an organization can configure a vulnerability scan

A

Target applications, schedule for certain groups, configure types of network pings, target ports, protocols to follow, testing accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a vulnerability scan plugin

A

The ability to test for one specific vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Scanner in the DMZ

A

Unrestricted access to webserver as it doesn’t have to pass through firewall (most clear view)

17
Q

Scanner on the network

A

Firewall may block some rules for scanner

18
Q

Scanner on the internet

A

Firewall will block most, scanner will see fewest vulnerabilities (attackers view)

19
Q

Agent-based Scans

A

Reaches out over network to probe

20
Q

Server-based Scans

A

Scanners installed on each target device and then report to system (more complex)

21
Q

Credentialed Scanning

A

Using passwords to log into systems (read only access, not admin credentials)

22
Q

SCAP

A

Security Content Authentication protocol - led by NIST - format for talking about issues

23
Q

CVSS

A

Common Vulnerability Scoring System - widely used to evaluate severity of vulnerability

24
Q

CCE

A

Common Configuration Enumeration - Consistent language when talking about system configuration

25
Q

CPEs

A

Common Platform Enumeration - Consistent language when talking about platform configuration

26
Q

CVE

A

Common Vulnerability Enumeration - Consistent language when talking about vulnerabilities

27
Q

XCCDF

A

Extensible Configuration Checklist Description Format - language for creating and sharing checklists

28
Q

OVAL

A

Open Vulnerability and Assessment Language - describe testing procedures in a programmatic fashion

29
Q

What is the scoring of the CVSS

A

10-point scale - based on 8 metrics

30
Q

What are the 8 metrics used to score the CVSS

A

UI User Interaction, Privileges Required Metric, Attack Complexity, Attack Vector, Confidentiality, Integrity, Availability, Scope

31
Q

How should the results of a scan be prioritized?

A

Vulnerability severity, system criticality, information sensitivity, remediation difficulty, system exposure

32
Q

Scan validation

A

Correlate scan results with other sources of information i.e. Industry Standards, Technical Information Sources, Trend Analysis