(7) Scan Result Validity Flashcards

1
Q

What is it when a scanner reports a vulnerability that does not exist?

A

When a scanner reports a vulnerability that does not exist, that is called a false positive error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is it called when a vulnerability scanner reports a vulnerability?

A

When a vulnerability scanner reports a vulnerability, it is called a positive report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a vulnerability reports an accurate positive report, what is it called? What about when it is inaccurate?

A

When a vulnerability scanner provides a report that is accurate, it is called a true positive report

When a vulnerability scanner provides a report that is not accurate, it is called a false positive report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is it called when a scanner reports that a vulnerability is not present?

A

When a vulnerability scanner reports that a vulnerability is not present, it is called a negative report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a vulnerability scanner reports a negative report that is accurate, what is it called? What if it is not accurate?

A

If a negative report is accurate, it is a true positive report. If it is not accurate, it is a false negative report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should an organization do if they decide to take no action against a vulnerability?

A

If an organization decides to take no action against a vulnerability, then the security team should file a documented exception and also set the scanner to ignore the exception vulnerability. This way it will create less noise on the system and not interrupt business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As a security team sees familiar results repeatedly. In the vulnerability scan, perhaps results that they don’t have to really do anything about, what should they do?

A

Security teams should document that they saw the results and what their chosen action was. This helps if and when they need to are audited so that they can demonstrate due diligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What sources of information intelligence should analysts use to validate their results or conduct additional research?

A

Analysts should obtain additional information from logs, SIEM systems, configuration management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How should trends factor in to vulnerability scanning?

A

Trends should be an important part of a vulnerability scanning plan. Check on new vulnerabilities that surface over time, how old any of them are, and how long it takes to handle them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What role does context and asset value play in a vulnerability management program?

A

Context is important. A vulnerability within a Internet facing system is a much bigger deal than one on an internal system shielded from the Internet.

Asset value is also important because higher value assets have a greater risk and should be higher up on the priority list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly