Analyzing Output from Vulnerability Scanners Flashcards

1
Q

A commonly used scheme for identifying vulnerabilities developed by MITRE and
adopted by NIST

A

Common Vulnerabilities and Exposures (CVE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A superset of the CVE database, maintained by NIST, that contains additional
information such as analysis, criticality metrics (CVSS), and fix information or
instructions

A

National Vulnerability Database (NVD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A knowledge base maintained by MITRE that classifies specific attack patterns
focused on application security and exploit techniques

A

Common Attack Pattern Enumeration and Classification (CAPEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scheme for identifying hardware devices, operating systems,
and applications
▪ cpe:/{part}:{vendor}:
{product}:{version}:
{update}:{edition}:{language}

A

Common Platform Enumeration (CPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scheme for provisioning secure configuration checks across multiple sources

A

Common Configuration Enumeration (CCE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A risk management approach to quantifying vulnerability data and then taking
into account the degree of risk to different types of systems or information

A

Common Vulnerability Scoring System (CVSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical (P), Local (L), Adjacent network (A), or Network (N)

A

Access Vector (AV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

High (H) or Low (L)

A

Access Complexity (AC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

None (N), Low (L), or High (H)

A

Privileges Required (PR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unchanged (U) or Changed (C)

A

Scope (S)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

High (H), Medium (M), or Low (L)

A

Confidentiality (C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

High (H), Medium (M), or Low (L)

A

Integrity (I)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

High (H), Medium (M), or Low (L)

A

Availability (A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A vulnerability report that is not validated is useless
o True Positives
o False Positives
o True Negatives
o False Negatives

A

Vulnerability Reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An alert that matches a vulnerability and the vulnerability exists on the system

A

True Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An alert that matches a vulnerability and the vulnerability does not exist on the
system

A

False Positive

17
Q

Exception Management

A

Exception Management

18
Q

An alert is not generated because there is no matching vulnerability on the
system

A

True Negative

19
Q

An alert is not generated even though there is a matching vulnerability on the
system

A

False Negative

20
Q

Reconcile results because scanners can misinterpret the information, they receive
from their probes

A

Validating Scan Reports

21
Q

A commercial vulnerability scanner produced by Tenable Network Security for on-premise and cloud-based vulnerability scanning

A

Nessus

22
Q

Open source vulnerability scanner that began its development from the Nessus
codebase when Nessus was converted to commercial software

A

OpenVAS

23
Q

A cloud-based vulnerability management solution with installed sensor agents at
various points in their network and the sensors upload data to the cloud platform
for analysis

A

Qualys