7.2 Assessing Security Flashcards
_____________ and ___________testing are two primary methods to assess security after implementing measures.
*
Vulnerability assessment and penetration
_________________ uses specialized tools to scan for known vulnerabilities.
*
Vulnerability assessment
Vulnerability assessment tools require______________ to remain useful and accurate.
*
constant updates
Vulnerability assessment results only indicate the ___________________________.
*
presence of specific known vulnerabilities on hosts
Conducting a vulnerability assessment involves several steps, including ______________________
mapping and discovery.
*
Mapping environments creates a ________________ present in the network.
*
list of devices
Mapping large networks can be ___________ and potentially ____________ to network infrastructure.
*
time-consuming; stressful
Discovering new hosts is necessary to keep ___________ up-to-date.
*
device lists
After __________, vulnerability scanning can be conducted using different types of scans.
*
mapping
What two methods can be used to discover new hosts on networks.
*
Active and passive
_____________________ don’t require credentials and show open ports and basic information.
*
Unauthenticated scans
________________________ use valid credentials to collect more thorough internal information.
*
Authenticated scans
_______________ use small software pieces installed on hosts to avoid some downsides of authenticated scans.
*
Agented scans
____________________focuses on specific applications, often web applications.
*
Application scanning
__________________ present challenges for vulnerability scanning due to provider restrictions.
*
Cloud environments
____________ in cloud environments require specialized vulnerability scanning tools.
*
Containers
__________________ is a more in-depth process than vulnerability scanning.
*
Penetration testing
Penetration testing aims to find_____________ before attackers do.
*
security holes
Penetration testing follows a standard process: 5 things
*
scoping, reconnaissance, discovery, exploitation, and reporting.
_______ defines what will be tested and may include rules of engagement.
*
Scoping
_____________ involves researching the target environment before active testing.
*
Reconnaissance
_____________ begins active testing, often using vulnerability assessment tools.
*
Discovery
____________ attempts to exploit vulnerabilities detected in earlier stages.
*
Exploitation
_____________ documents findings and steps to reproduce successful attacks.
*
Reporting
Penetration tests can be classified as _________, __________, or ____________ based on information provided.
*
black box; (Attacker knows nothing - only scope) white box; (attacker know hosts, ip addresses etc.) gray box; (hacker knows a hybrid of the two)