ch 11 1 Flashcards

1
Q

RISK ASSESSMENT ORDER

A

Identify the organization’s assets.
Step 2. Identify vulnerabilities.
Step 3. Identify threats and threat likelihood.
Step 4. Identify potential monetary impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Qualitative

A

is an assessment that assigns numeric values to the
probability of a risk and the impact it can have on the system or network. Unlike

EX 0TO 100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Quantitative risk assessment measures risk by using exact monetary values.

A

SLE × ARO = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Management controls:

A

how the security
of your data and systems is managed
focus on decisions and the management of risk.
EXECUTIVES SET THEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Operational controls:

A

increase individual and group system security. They include user
awareness and training disaster recovery plans, incident
handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TECHNICAL CONTROLS

A

logical controls executed by the computer
system. EX authentication, access control, auditing,
and cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability management STEPS

A

Define the desired state of security. Create baselines.

Prioritize vulnerabilities. Mitigate vulnerabilities. Monitor the environment—

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

vulnerability scanning may be passive

or active, whereas penetration testing will be active

A

vulnerability scanning will seek out all vulnerabilities

and weaknesses within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TYPES SCANS

A

vulnerability scan with Nessus

port scanner is Nmap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Banner grabbing

A

find out information about web servers,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DICT ATTACK

A

Uses a prearranged list of likely words, trying each of

them one at a time. It can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptanalysis attack:

A

Uses a considerable set of precalculated encrypted passwords

located in a lookup table. These tables are known as rainbow tables ,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly