CH22 Vulnerability Management Flashcards

1
Q

What is Vulnerability Assessment?

A

seeks to identify any issues in a network, application, database, or other systems prior to it being used that might compromise the system. It is a formalized process that define, identify, and classify the security holes in an enterprise network architecture. It’s also used to forecast the effectiveness of proposed countermeasures as part of your overall risk analysis process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Vulnerability management ?

A

practice of finding and mitigating the vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 questions can help to scope your assessments?

A
  1. What is the value of the information?
  2. What is the specific threat that your system is facing?
  3. What mitigation strategies could be deployed to address the issues that are found?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some of the vulnerability management programs?

A

Nessus
Qualysguard
AlienValut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 5 Steps of vulnerability management process?

A
  1. Define the desired state of security
  2. Create a baseline – understand what normal is and what your current state of your systems is.
  3. Prioritize the vulnerabilities – which one gets fixed first?
  4. Mitigate Vulnerabilities – install controls and patches to make your system more secure
  5. Monitor the network and systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Penetration Testing ( or Pentest )

A

Done by team of professionals to simulate an attack on your network, its system, or its applications…. As if a real hacker would break into your network.

Penetration tests look at a network’s vulnerabilities from the outside.
Penetration tools like Metasploit and CANVAS are commonly used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 steps of Pentest ?

A
  1. Get permission & document info
  2. Gather information about the target through reconnaissance
  3. Enumerate the targets to identify known vulnerabilities
  4. Exploit the network to gain users or privilege access
  5. Document all of your results and provide report.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Pivot in regards to Vulnerability threats ?

A

occurs when an attacker moves onto another workstation or user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Persistence in regards to vulnerability threats?

A

ability of an attacker to maintain a foothold inside the compromised network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Tabletop Exercises (TTX)?

A

uses an incident scenario against a framework of controls or a red team. During this exercise, you will carry a discussion of simulated emergency situations.

Theoretical in nature and do not provide practical evidence of what could go wrong during a real event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Red/Blue/White exercises?

A

Red Team – the hostile or attacking team in a penetration test. (3rd party)

Blue Team – the defensive team in a penetration test. (Sys admins, network defenders, cybersecurity analysts)

White Team – staff who administers, evaluates, and supervises a penetration test. They may build the environment for the test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is OVAL?

A

For the exam : OVAL = Open Vulnerability and Assessment Language.

It is used to share data between lots of different tools that are focused on vulnerability assessments and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is OVAL Language?

A

written as an XML schema. Used to define and describe the information that’s being created by the OVAL (Open Vulnerability and Assessment Language) language, and it’s allowing to be shared among various programs and tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What OVAL Interpreter

A

a reference developed to ensure the information passed around by these programs complies with the OVAL (Open Vulnerability and Assessment Language) schemas and definitions used by the OVAL language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Network Mapping in regards to vulnerability assessment?

A

Discovery and documentation of physical and logical connectivity that exists in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Vulnerability scanning in regards to vulnerability assessment?

A

a technique that identifies threats on the network without exploiting them.

Nessus and Qualysguard are commercial vulnerability scanners that can scan for open ports, enumerate the services on those ports, and then determine if a vulnerability exists on those services by checking if they’ve been patched for known exploits

17
Q

What is Banner Grabbing

A

a technique used to gain information about servers and inventory the systems or services.

18
Q

What is Network sniffing in regards to vulnerability assessment?

A

the process of finding and investigating other computers on the network by analyzing the network traffic or capturing the packets being sent

Network sniffer, packet sniffing, and protocol analyzer can all conduct packet capture

19
Q

What is Protocol Analyzer ?

A

software tool that allows for the capture, reassembly, and analysis of packets from the network. Most commonly used protocol analyzer is Wireshark

20
Q

What is Password analysis in regards to vulnerability assessment?

A

a tool used to test the strength of your passwords to ensure your password policies are being followed

21
Q

What is Nmap?

A

For the exam : be aware that Nmap is a tool that can be used to determine what hosts are on the network. Therefore, it is a network mapping tool. It also can be sued to determine what services are running on what open ports.. so it can also be considered a vulnerability scanner

22
Q

What is Password Cracker?

A

uses comparative analysis to break passwords and systematically continues guessing until the password is determined.

Two most well-known password crackers are : Cain & Abel and John the Ripper.

23
Q

What are the 4 methods of doing password cracking and analysis?

A
  1. Password Guessing – occurs when a weak password is simply figured out by a person
  2. Dictionary Attack – a program attempts to guess the password by using a list of possible passwords.
  3. Brute Force Attack – Method where a program attempts to try every possible combination until it cracks the password
  4. Cryptanalysis Attack – Comparing a precomputed encrypted password to a value in a lookup table
24
Q

What is Rainbow Table?

A

List of precomputed valued used to more quickly break a password since values don’t have to be calculated for each password being guessed