Book 2 Flashcards
__ ___ involves trying to get access to your system from an attackers perspective.
Penetration Testing.
__ __ Is a software program that contains a database of known vulnerabilities against your system to identify weaknesses.
Vulnerability Testing
The vulnerability scanner can test the security controls without doing any actual harm. What is this known as?
Passively Testing Security Controls.
In vulnerability scanning, once the results are found, what happens next?
you need to interpret your results.
In __ __ testing, the administrator acts as if they have no prior knowledge of the network.
Black Box
Black Box testing is also known as __
Blind Testing.
In __ __ testing, the ethical begins from the premise of knowing something about the network and systems in place.
White Box
White Box testing, is also known as ___
Full Disclosure testing
In __ __ testing simulates an outsider is working with someone on the inside who has given them some information.
Gray Box Testing
Grey Box testing is also known as_
Partial disclosure testin.
The __ review assessment examines the ports and protocols used, the rules, segmentation and access control.
design review
___ are indications of a problem currently going on.These are conditions that you must respond to right now.
Alarms
Slightly below alarms are ___ these are issues that you need to pay attention to but are not bringing the system to its knees at this very moment
Alerts
___ indicates where problems are occurring.
Trends