2.1 Vulnerability Management Flashcards

1
Q

what should you consult to identify all systems that need to have a vulnerability scan?

A

the company’s asset inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a flaw, loophole, or weakness in the system, software, or hardware?

A

vulnerabiltiy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which scan has less of an impact on the network: agent-based or server-based?

A

agent-based vulnerability scans because they run on the device and only send the report to the centralized server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the two main factors that CompTIA list as factors for prioritizing vulnerability remediation?

A

criticality and difficulty of implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how often should vulnerability scans be carried out based on PCI-DSS standards?

A

every three months and whenever systems are updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which SCAP component provides standardized names for security-related software flaws?

A

common vulnerabilities and exposures (CVE)2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what does the acronym CCE denote?

A

common configuration enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which systems provides CCE and CVE identifiers for vulnerability scans?

A

security content automation protocol (SCAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which term is used for an agreement that is signed by two partnering companies?

A

business partners agreement (BPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does the acronym CVE denote?

A

common vulnerabilities and exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which term is used for an agreement between two or more parties where the parties cannot create a legally enforceable agreement?

A

memorandum of understanding (MoU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what does the acronym SCAP denote?

A

security content automation protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which step of the vulnerability management process involves assessing the documented requirements and workflow to determine when scans should occur?

A

establish scanning frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why should you document workflow prior to setting up a vulnerability scan?

A

to help provide business constraints for the scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which step of the vulnerability management process involves documenting the regulatory environment and corporate policy, classifying data, and obtaining an asset inventory?

A

identify requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

in which situation will you accept a risk?

A

when the cost of the safeguard exceeds the amount of the potential loss

17
Q

why should you deploy remediation in a sandbox environment?

A

to test the effects of the remediation to ensure that the devices will be able to function properly after deployment

18
Q

what is the process for the vulnerability management process?

A
  1. identify requirements
  2. establish scanning frequency
  3. configure the tools to perform the scans according to specifications
  4. execute the scan
  5. generate scan reports
  6. provide remediation for discovered vulnerabilities
19
Q

what does the acronym CVSS denote?

A

common vulnerability scoring system

20
Q

what is a service level agreement (SLA)?

A

a contract between a network service provider and a customer that specifies the services the network service provider will furnish

21
Q

which range of CVSS scores indicates low priority?

A

0.1 to 3.9

22
Q

what is meant by the term vulnerability feed?

A

the updates to the vulnerability scanner that ensures that the scanner is able to recognize newly discovered vulnerabilities

23
Q

which range of CVSS scores indicates high priority?

A

7.0 to 8.9

24
Q

what happens with an agent-based vulnerability scan?

A

agents are installed on the devices to run the scan and send the report to a centralized server

25
Q

which range of CVSS scores indicates medium priority?

A

4.0 to 6.9

26
Q

what is the recommended action when the cost of the safeguard exceeds the amount of the potential loss for a given risk?

A

to accept the risk

27
Q

which permissions should you assign the account used for the vulnerability scans?

A

read only

28
Q

which SCAP component provides standard names for product names and versions?

A

common platform enumeration (CPE)

29
Q

which step of the vulnerability management process includes scanning criteria, such as sensitivity levels, vulnerability feed, and scope?

A

configure the tools to perform the scans according to specifications

30
Q

which range of CVSS scores indicates critical priority?

A

9.0 to 10.0

31
Q

what is meant by the scope of a vulnerability scan?

A

the range of hosts or subnets included in the scan

32
Q

what is the purpose of a discovery vulnerability scan?

A

to create an inventory of assets based on host or service discovery

33
Q

which SCAP component provides a standardized metric that measures and describes the severity of security-related software flaws?

A

common vulnerability scoring system (CVSS)

34
Q

what is the term Nessus uses for vulnerability feeds?

A

plug-ins

35
Q

which type of vulnerability scan includes the appropriate permissions for the different data types?

A

credentialed scan

36
Q

what does a CVSS score of 0 indicate?

A

no issues

37
Q

what are the FIVE inhibitors to remediation after a vulnerability scan?

A
MOUs
SLAs
Organizational Governance
Business process interruption
Degrading functionality
38
Q

what does the acronym CPE denote?

A

common platform enumeration (CPE)