1.7 Summarize the techniques used in security assessments Flashcards
1
Q
Threat hunting
-Intelligence fusion
A
2
Q
Threat hunting
-Threat feeds
A
3
Q
Threat hunting
-Advisories and bulletins
A
4
Q
Threat hunting
-Maneuver
A
5
Q
Vulnerability scans
-False positives
A
6
Q
Vulnerability scans
-False negatives
A
7
Q
Vulnerability scans
-Log reviews
A
8
Q
Vulnerability scans
-Credentialed vs. non-credentialed
A
9
Q
Vulnerability scans
-Intrusive vs. non-intrusive
A
10
Q
Vulnerability scans
-Application
A
11
Q
Vulnerability scans
-Web application
A
12
Q
Vulnerability scans
-Network
A
13
Q
Vulnerability scans
-Common vulnerabilities and Exposures (CVE)/Common Vulnerability Scoring System (CVSS)
A
14
Q
Vulnerability scans
-Configuration review
A
15
Q
Syslog/Security information and event management (SIEM)
-Review reports
A