Chap 5 - Interpreting Vulnerability Scans Flashcards

1
Q

Which one of the CVSS metrics would contain information about the type of user account an attacker must use to execute an attack?

A. AV
B. C
C. PR
D. AC

A

PR

The Privileges Required (PR) vector describes whether the attacker needs no user privileges, normal user privileges, or administrative user privileges to conduct the attack. The other vectors described in this question are the Attack Vector (AV), Attack Complexity (AC), and Confidentiality (C) vectors. They would not contain information about user authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CVSS metric: AV

A

Attack Vector

Measures how the vulnerability can be exploited, such as locally or remotely over a network​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CVSS metric: C

A

Confidentiality

Assesses the potential impact on data confidentiality if the vulnerability is exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CVSS metric: PR

A

Privileges Required

Describes the level of privileges an attacker must have to exploit the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CVSS metric: AC

A

Attack Complexity

Evaluates the conditions that must exist beyond the attacker’s control to exploit the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVSS metric: I

A

Integrity

Evaluates the degree of alteration to data integrity an attacker might cause-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CVSS metric: A

A

Availability

easures the potential disruption or unavailability of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CVSS metric: S

A

Scope

Indicates whether the exploitation of the vulnerability can affect other components outside the original security boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CVSS metric: UI

A

User Interaction

Determines whether exploiting the vulnerability requires action from another user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the CVSS metrics?

A
  • Attack Vector (AV): Measures how the vulnerability can be exploited, such as locally or remotely over a network
  • Attack Complexity (AC): Evaluates the conditions that must exist beyond the attacker’s control to exploit the vulnerability
  • Privileges Required (PR): Describes the level of privileges an attacker must have to exploit the vulnerability
  • User Interaction (UI): Determines whether exploiting the vulnerability requires action from another user
  • Confidentiality (C): Assesses the potential impact on data confidentiality if the vulnerability is exploited
  • Integrity (I): Evaluates the degree of alteration to data integrity an attacker might cause
  • Availability (A): Measures the potential disruption or unavailability of the system
  • Scope (S): Indicates whether the exploitation of the vulnerability can affect other components outside the original security boundary​.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which one of the following values for the CVSS attack complexity metric would indicate that the specified attack is simplest to exploit?

A. High
B. Medium
C. Low
D. Severe

A

Low

An access complexity of “low” indicates that exploiting the vulnerability does not require any specialized conditions. A value of “high” indicates that specialized conditions are required. High and low are the only two possible values for this metric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which one of the following values for the confidentiality, integrity, or availability CVSS metric would indicate the potential for total compromise of a system?

A. N
B. A
C. H
D. L

A

H

If any of these measures is marked as H, for High, it indicates the potential for a complete compromise of the system.

N = None
L = Low

A is not used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the most recent version of CVSS that is currently available?

A. 1.0
B. 2.0
C. 2.5
D. 3.0

A

3.0

Version 3.0 of CVSS is currently available and is the version described in this chapter.

in Nov 2023, v4.0 was released

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kevin recently identified a new security vulnerability and computed its CVSS base score as 6.5. Which risk category would this vulnerability fall into?

A. Low
B. Medium
C. High
D. Critical

Explanation

Vulnerabilities that have a CVSS base score between 4.0 and 6.9 fall into the Medium rating category.

A

Medium

Vulnerabilities that have a CVSS base score between 4.0 and 6.9 fall into the Medium rating category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CVSS Score Ranges

A
  • 0.0: None
  • 0.1–3.9: Low
  • 4.0–6.9: Medium
  • 7.0–8.9: High
  • 9.0–10.0: Critical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which one of the following is not a common source of information that may be correlated with vulnerability scan results?

A. Logs
B. Database tables
C. SIEM
D. Configuration management system

A

Database tables

It is unlikely that a database table would contain information relevant to assessing a vulnerability scan report. Logs, SIEM reports, and configuration management systems are much more likely to contain relevant information.

17
Q

The Dirty COW attack is an example of what type of vulnerability?

A. Malicious code
B. Privilege escalation
C. Buffer overflow
D. LDAP injection

A

Malicious code

In October 2016, security researchers announced the discovery of a Linux kernel vulnerability dubbed Dirty COW. This vulnerability, present in the Linux kernel for nine years, was extremely easy to exploit and provided successful attackers with administrative control of affected systems.

18
Q

Dirty COW

A

Dirty COW refers to a vulnerability discovered in October 2016 in the Linux kernel, where the flaw allowed an attacker to exploit a race condition in the kernel’s handling of copy-on-write (COW) operations.

This vulnerability, which had been present in the Linux kernel for nine years, was particularly dangerous because it was easy to exploit and enabled attackers to gain administrative control over affected systems

19
Q

Which one of the following conditions would not result in a certificate warning during a vulnerability scan of a web server?

A. Use of an untrusted CA
B. Inclusion of a public encryption key
C. Expiration of the certificate
D. Mismatch in certificate name

A

Inclusion of a public encryption key

Digital certificates are intended to provide public encryption keys and this would not cause an error. The other circumstances are all causes for concern and would trigger an alert during a vulnerability scan.

20
Q

ICS

A

Industrial Control Systems

21
Q

SCADA

A

Supervisory Control and Data Acquisition

22
Q

Monica discovers that an attacker posted a message attacking users who visit a web forum that she manages. Which one of the following attack types is most likely to have occurred?

A. SQL injection
B. Malware injection
C. LDAP injection
D. Cross‐site scripting

A

Cross‐site scripting

In a cross‐site scripting (XSS) attack, an attacker embeds scripting commands on a website that will later be executed by an unsuspecting visitor accessing the site. The idea is to trick a user visiting a trusted site into executing malicious code placed there by an untrusted third party.

23
Q

XSS

A

Cross-Site Scripting (XSS) is a web application vulnerability where attackers inject malicious scripting code into a web page that executes in the browsers of unsuspecting users.

24
Q

Types of XSS

A
  • Reflected XSS: The malicious script is reflected off a web server and executed in the user’s browser immediately
  • Stored XSS: The script is permanently stored on a target server (e.g., in a database) and executed whenever the affected data is accessed
  • DOM-based XSS: The malicious script is executed as a result of modifications to the Document Object Model (DOM) within the browser
25
Q

Alan is reviewing web server logs after an attack and finds many records that contain semicolons and apostrophes in queries from end users. What type of attack should he suspect?

A. SQL injection
B. LDAP injection
C. Cross‐site scripting
D. Buffer overflow

A

SQL injection

In a SQL injection attack, the attacker seeks to use a web application to gain access to an underlying database. Semicolons and apostrophes are characteristic of these attacks.