1.5 Vulnerability Concepts (Chapter 8) Flashcards

1
Q

evaluates everything needed to produce and sell a product

A

supply chain assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

used to gain information about remote systems and many network scanners using it

A

banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what command line tools can be used for banner grabbing?

A

netcat, telnet, nmap, zenmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

active test that can assess deployed security controls and determine impact of a threat

A

penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this test starts with a vulnerability scan and then tries to exploit vulnerabilities by actually attacking or simulating an attack

A

penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when testers use known methods to exploit a vulnerability

A

initial exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

logging information on what users do

A

usage auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

rights and permissions assigned to users and helps ensure least privilege is enforced

A

permission auditing review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly