2.4: Vulnerability Management Flashcards

1
Q

What is the purpose of vulnerability Management

A

To identify and manage vulnerabilities in IT application and infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can cause vulnerabilities

A

Errors in configuration, flaws in overall architecture, or form newly discovered weakness reported by security researchers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Activities of the vulnerabilities Management

A
  • Subscribing to security alerts
  • Subscribing to security alerts
  • Patch management
  • Corrective action process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purpose of threat management

A

The purpose of threat management is to acquire intelligence on credible threats that may be realized in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Hunting

A

The activity of proactively looking for active threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat modeling

A

The activity of looking for potential threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internal sources that provide information about threats

A

Security systems such as IPSs, firewall, data loss prevention systems, web-filtering system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

External sources that provide information about threats

A

Subscription to threat intelligence feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

System Hardening

A

is the process of changing the configuration of a system (which could be a server, subsystem, or network device) so that it is more resistant to malfunctions and attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risks caused by servers consolidations

A

Consolidation may reduce the number of servers and make an environment simpler, but it also increases risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

sendmail program

A

Sendmail is a large, complex program that is the subject of ongoing security research, and new vulnerabilities are discovered from time to time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should Nonessentiel user IDS be removed

A

Because hackers often exploit access privileges for nonessential user IDs such as guests accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does virtualization permit

A

Virtualization permits two or more operating systems to run concurrently on a hardware system, each with its own share of resources, and each operating as though it were running on its own physical server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User access provisioning

A

the process whereby user accounts are created for new employees and other personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employee transfers

A

employee’s old access rights should be rescinded when their new accesses are provisioned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

privileges creep or accumulation of privileges

A

In organizations that do not manage user access changes that are related to employee transfers, some employees will have a growing list of access privileges.

17
Q

Resting password via a URL mail

A

If a password is sent via-email, the application should require the user to choose a new password on first login.

18
Q

Password length

A

Minimum of seven to eight characters

19
Q

Are security control for mobile devices an additional controls?

A

They are compensating controls that reduce data compromise risks