Chapter 05: Security Assessment and Testing Flashcards

1
Q

_________ programs play a criticial role in identifying, prioritizing and remediating vulnerabilities in our environments.

A

Vulnerability Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Vulnerability Management use to detect new vulnerabilities as they arise and then implement a remediation workflow that addresses the highest priority vulnerabilities?

A

Vulnerability Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cybersecurity professionals use scanning tools to search the network for connected systems, whether they were previously known or unknown, and to build an _________.

A

Asset Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ (a) and ________ (b) information helps guide decisions about the types of scans that are performed, the frequency of those scans and the priority administrators should place on remediating vulnerabilities detected by the scan.

A

Asset Inventory and Asset Criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 5 different factors from the book that may influence how often an organization decides to conduct a vulnerability scan?

A
  • Organization’s Risk Appetite
  • Regulatory Requirements
  • Technical Constraints
  • Business Contains
  • Licensing Limitations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is the organizations willingness to tolerate risk within the environment.

A

Organization’s Risk Appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____, such as those imposed by the Payment Card Industry Data Security standard may dictate a minimum frequency for vulnerability scans.

A

Regulatory Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ may limit the frequency of scanning. For example, the scanning system may only be capable of performing a certain number of scans per day and organizations may need to adjust scan frequency to ensure that all scans complete successfully.

A

Technical Constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ may limit the organization from conducting resource-intensive vulnerability scans during periods of high business activity to avoid disruption of critical processes.

A

Business Constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______ may curtail the bandwidth consumed by the scanner or the number of scans that may be conducted simultaneously.

A

Licensing Limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is it important to conduct regular configuration reviews of vulnerability scanners?

A

It ensures the scan settings match current requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is important to conduct regular ______ of vulnerability scanners to ensure that scan settings match current requirements.

A

configuration reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ typically only retrieve info from target servers and do not make changes to the server itself.

A

Credential Scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Each ________, conducts the scan from a different location on the network, providing a different view into vulnerabilities.

A

Scan perspectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ___________ is an effort by the security community led by the NIST, to create a standardized approach for communicating security-related information.

A

Security Content Automation Process (SCAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

________ provides the standard nomenclature for discussing system configuration issues.

A

Common Configuration Enumeration (CCE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_______ provides a standard nomenclature for describing product names and versions.

A

Common Platform Enumeration (CPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____ provides a standard nomenclature for describing security-related software flaws.

A

Common Vulnerabilities and Exposures (CVE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ provides a standard approach for measuring and describing the severity of security-related software flaws.

A

Common Vulnerability Scoring System (CVSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_______ - a language for specifying checklists and reporting checklist results.

A

Extensible Configuration Checklist Description Format (XCCDF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ - A language for specifying low-level testing procedures used by checklists.

A

Open Vulnerability and Assessment Language (OVAL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

______ analyzes code for vulnerabilities without executing it.

A

Static Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____ executes code as part of the test, running all the interfaces that the code exposes to the user with a variety of inputs, searching for vulnerabilities.

A

Dynamic Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

______ analyzes the source code while testers interact with the application through exposed interfaces.

A

Interactive Testing

25
Q

Which is a free Infrastructure Vulnerability Scanning tool?
a. Nessus
b. OpenVAS
c. Qualys’s Vulnerability CScanner
d. Rapid7

A

b. OpenVAS

26
Q

Which of the following are free web application scanning tool? (Select all that applies)
a. Nessus
b. Nikto
c. Rapid7
d. Arachni

A

b. Nikto
d. Arachni

27
Q

Name 4 Values in the CVSS attack vector metric.

A

Physical, Local, Adjacent Network, Network

28
Q

The _____ describes how an attacker would exploit the vulnerability.

A

Attack Vector Metric

29
Q

The ______ describes the difficulty of exploiting the vulnerability.

A

Attack Complexity Metric

30
Q

The ______ describes the type of account access that an attacker would need to exploit a vulnerability.

A

privileges required metric

31
Q

The _____ describes whether the attacker needs to involve another human in the attack.

A

User Interaction Metric

32
Q

The ______ describes the type of information disclosure that might occur if an attacker successfully exploits the vulnerability.

A

Confidentiality metric

33
Q

The _____ describes the type of information alteration that might occur if an attacker successfully exploits the vulnerability.

A

Integrity Metric

34
Q

The ______ describes the type of disruption that might occur if an attacker successfully exploits the vulnerability.

A

Availability Metric

35
Q

The _______ describes whether the vulnerability can affect system components beyond the scope of the vulnerability.

A

Scope Metric

36
Q

There are 8 metrics used in the CVSS. Name them all.

A
  1. Scope Metric (S)
  2. Availability Metric (A)
  3. Integrity Metric (I)
  4. Confidentiality Metric (C)
  5. User Interaction Metric (UI)
  6. Privileges Required Metric (PR)
  7. Attack Complexity Metric (AC)
  8. Attack Vector Metric (AV)
37
Q

Formula for calculating the “Impact Sub-Score” (ISS)

A

ISS = 1 [(1 - Confidentiality) x (1 - Integrity) x (1 - Availability)]

38
Q

Formula for the Impact Score when the scope metric is “Unchanged”?

A

Impact = 6.42 x ISS

39
Q

Formula for the Impact Score when the scope metric is “Changed”?

A

Impact = 7.52 x (ISS - 0.029) - 3.25 x (ISS - 0.02)^15

40
Q

Exploitability Score formula

A

Exploitability = 8.22 x Attack Vector x Attack Complexity x PrivilegesRequired x UserInteraction

41
Q

In the CVSS Qualitative Severity Rating Scale, what CVSS score range has a rating of none?

A

less than 0.1 (< 0.1)

42
Q

In the CVSS Qualitative Severity Rating Scale, what CVSS score range has a rating of Low?

A

0.1 - 3.9

43
Q

In the CVSS Qualitative Severity Rating Scale, what CVSS score range has a rating of Medium?

A

4.0 - 6.9

44
Q

In the CVSS Qualitative Severity Rating Scale, what CVSS score range has a rating of High?

A

7.0 - 8.0

45
Q

In the CVSS Qualitative Severity Rating Scale, what CVSS score range has a rating of Critical?

A

9.0 - 10.0

46
Q

When a vulnerability scanner reports a vulnerability, this is known as a ______ report.

A

Positive

47
Q

When a vulnerability scanner reports an inaccurate vulnerability, this is known as a _____.

A

False positive report

48
Q

When a scanner reports that a vulnerability is not present, this is a _______.

A

Negative Report

49
Q

When a scanner reports that a vulnerability is not present and this is inaccurate, this is a _____.

A

False Negative report

50
Q

Cybersecurity analysts interpreting these reports should also turn to other sources of security info as they perform their analysts. Name a valuable information source.

A
  • Log Reviews from servers, applications, network devices, and other sources that might contain information about possible attempts to exploit detected vulnerabilities.
  • SIEM systems that correlated log entries from multiple sources and provide actionable intelligence.
  • Configuration management systems that provide information on the operating system and applications installed on a system.
51
Q

_______ - They are performed with full knowledge of the underlying technology, configuration and settings that make up the target.

A

White-box Penetration test

52
Q

______ - Testers are not provided with access to or information about an environment, and must gather information, discover vulnerabilities and make their way through an infrastructure or systems like an attacker would.

A

Black-box Penetration Tests

53
Q

______ - Partially known environment tests. Some information about the environment is known without giving full access, credentials or configuration details.

A

Gray-box tests

54
Q

Name 3 key elements that may be listed in the rules of engagement?

A
  • Timeline for the engagement.
  • What locations, systems, applications or other potential targets are included/excluded.
  • Data handling requirements for information gathered during the penetration test.
  • What behaviors to expect from the target. Defensive behaviors like shunning, blacklisting or other active defenses may limit the value of the penetration test.
  • What resources are committed to the test.
  • Legal concerns should be addressed.
  • When/How communications will occur. Should the engagement include daily or weekly updates regardless of progress.
55
Q

______ is the technique in which hackers use the drones and unmanned aerial vehicles to attempt to eavesdrop on or connect to wireless networks.

A

War Flying

56
Q

______ is a technique where hackers drive by facilities in a car equipped with high-end antennas and attempt to eavesdrop on or connect to wireless networks.

A

War driving

57
Q

_______ uses hacking techniques to shift form the initial access gained by the attacker to more advanced privileges such as root access on the same system.

A

Privilege escalation

58
Q

______ occurs as the attacker uses initial system compromise to gain access to other systems on the target network.

A

Pivoting (lateral movement)