5 Security Assessment and Testing Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common sources of vulnerabilities in computing environments?

A

Improper or weak patch management, weak configuration settings

Weak configuration settings include open permissions, unsecured root accounts, errors, weak encryption settings, insecure protocol use, default settings, and open ports and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a false positive in vulnerability scanning?

A

A report that detects a vulnerability that does not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a false negative in vulnerability scanning?

A

A report that does not detect a vulnerability that actually exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary goal of threat hunting?

A

To discover existing compromises within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What tools do threat hunters use?

A

Advisories, bulletins, and threat intelligence feeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of vulnerability scans?

A

To probe systems, applications, and devices for known security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What standards are used to describe and rate vulnerabilities?

A

Common Vulnerabilities and Exposures (CVE) and Common Vulnerability Scoring System (CVSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is penetration testing?

A

A simulated cyber attack conducted by security professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of environments in penetration testing?

A

Known environment, unknown environment, partially known environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the first step in penetration testing?

A

Reconnaissance efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of bug bounty programs?

A

To incentivize external security professionals to report vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of a security audit?

A

To formally examine an organization’s security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who can perform security audits?

A

Internal audit teams or independent third-party auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the stages of the vulnerability life cycle?

A

Vulnerability identification, analysis, response and remediation, validation of remediation, reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is involved in the analysis stage of the vulnerability life cycle?

A

Confirming the vulnerability, prioritizing it using CVSS and CVE, considering organization-specific factors.

17
Q

What are some responses to identified vulnerabilities?

A
  • Applying patches
  • Isolating affected systems
  • Implementing compensating controls
  • Transferring risk through insurance
  • Formally accepting the risk.
18
Q

What is the purpose of validation in the vulnerability life cycle?

A

To ensure the vulnerability is no longer present.

19
Q

What does reporting in the vulnerability life cycle inform stakeholders about?

A

Findings, actions, trends, and recommendations for improvement.