12-5 Flashcards

1
Q

this is another eay to use scanning tool for windows. downloaded from Major Geeks. enables you to monitor all open TCP and UDP ports on the local computer. maps ports to the owning application so you can watch which process has been opened.

A

Active ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

reports all open TCP/IP and UDP ports and maps them to owning application

A

Fport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a windows program that will show you detailed listing of all TCP and UDP endpoints on your system including remote address and state of TCP connections.

A

TCPView

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

port scanner originally from Foundstone now distributed by McAfee

A

Superscan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

not the most robust vulnerability assessment tool, but it has an easy-to-use interface. you can scan on a machine or many others. prints out a report.

A

Microsoft baseline security analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

offers basic system enumeration

A

NSA auditor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

most popular port scanner out there

A

NMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the most common list of vulnerabilities maintained by the MITRE corporation. its the most common and most comprehensive list. allows security professionals to communicate effectively about vulnerabilities.

A

CVE ( common Vulnerability Exposures )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

maintains a database of vulnerabilities that you can access at NVD. also uses CVE format.

A

NIST National institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

standard for web application security.

A

owasp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a way of evaluating security of a network, looking at all aspects. it looks at security as a three-dimensional cube. the three dimensions are goals, information states, and safeguards, describe next.

A

McCumber Cube

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

three goals of cybersecurity

A

CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

information states

A

storage
transmission
processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

information security safeguards

A

policy and practices
human factors
technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly