3.2 Security Assessment Tools Flashcards

1
Q

(Network Tool Types)

Port Scanners

A

tools designed to scan one or more systems to determine which TCP/UDP ports are open, closed, or filtered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(Network Tool Types)

Vulnerability Scanners

A

programs designed to scan systems for weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(Network Tool Types)

Protocol Analyzers

A

tools that can be used to capture and analyze traffic passing over a communications channel on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Network Tool Types)

SCAP Scanner

A

Security Content Automation Protocol employs existing open security standards in order to conduct vulnerability scans-while measuring and ranking the discovered vulnerabilities according to predetermined baselines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(Network Tool Types)

Network Enumerator

A

scans systems and gives us more details such as usernames, groups, shares, and audit options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(Network Tool Types)

Fuzzer

A

testing tools used to find implementation bugs in software by submitting malformed or semi-malformed data to an application in an automated fashion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(Network Tool Types)

HTTP Interceptor

A

capture web traffic between the source web browser and the destination website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Network Tool Types)

Exploitation Tools/Frameworks

A

can exploit discovered vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Network Tool Types)

Visualization Tools

A

specialize in converting raw data into useful visual aids

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Network Tool Types)

Log reduction tools

A

filters out junk data while ensuring important data is brought into focus and analyzed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(Network Tool Types)

Log analysis tools

A

can help aggregate data, correlate it, and perform detailed reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(Host Tool Types)

Password Crackers

A

specialized tools designed to essentially guess passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Host Tool Types)

vulnerability scanner

A

designed to run on a specific host and look for vulnerabilities and misconfigurations on the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Host Tool Types)

Command Line Tools

A

can be used to perform routine network troubleshooting in addition to security assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Host Tool Types)

Antivirus

A

must be assessed for signs of tampering by malware aiming to disable the alerting/notificaiton/real-time protection features of antivirus tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(Host Tool Types)

Reverse Engineering Tools

A

process of disassembling a finished product or process into its building blocks in order to understand how the outcome was achieved from stat to finish

17
Q

(Physical Security Tools)

Lock Picks

A

can be used both to pick a lock and test a locks resistance to lock picking

18
Q

(Physical Security Tools)

RFID tools

A

uses electromagnetic fields to track virtually anything, including technological assets, employees, patients, children, animals, smart appliances, and car fobs

19
Q

(Physical Security Tools)

IR Camera

A

use infrared energy in to form an image so that the camera can “see” in the dark