1.7Vulnerability scanning concepts Flashcards

1
Q

Passively test security controls

A

Uses an automated vulnerability scanner. Observes and reports findings. Does not take down systems, applications, or services, and doesn’t disrupt business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identity Vulnerability

A

Understanding common attacks and taking inventory of vulnerabilities. scanners can report: missing updates, misconfigured security settings, and known exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identify lack of security controls

A

Vulnerability scanners can identify a missing patch of antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identify common misconfigurations

A

Weak passwords, default usernames and passwords, and open ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intrusive vs. non intrusive

A

Intrusive testing can interrupt service, is much more detailed, and exploits vulnerabilities. non intrusive is more passive, does not exploit vulnerabilities, and does not disrupt service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Credentialed vs non credentialed

A

credentialed are done as though it is inside the network, emulates an insider attacks. Non-credentialed are done as though it is outside the network, emulates an outside attack. Shows what would be found if the network was scanned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

False positive

A

A result which shows incorrectly that a condition or attribute is present. a false vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly