Chapter 05: Security Assessment and Testing Flashcards
_________ programs play a criticial role in identifying, prioritizing and remediating vulnerabilities in our environments.
Vulnerability Management
What does Vulnerability Management use to detect new vulnerabilities as they arise and then implement a remediation workflow that addresses the highest priority vulnerabilities?
Vulnerability Scanning
Cybersecurity professionals use scanning tools to search the network for connected systems, whether they were previously known or unknown, and to build an _________.
Asset Inventory
______ (a) and ________ (b) information helps guide decisions about the types of scans that are performed, the frequency of those scans and the priority administrators should place on remediating vulnerabilities detected by the scan.
Asset Inventory and Asset Criticality
Name 5 different factors from the book that may influence how often an organization decides to conduct a vulnerability scan?
- Organization’s Risk Appetite
- Regulatory Requirements
- Technical Constraints
- Business Contains
- Licensing Limitations
_____ is the organizations willingness to tolerate risk within the environment.
Organization’s Risk Appetite
_____, such as those imposed by the Payment Card Industry Data Security standard may dictate a minimum frequency for vulnerability scans.
Regulatory Requirements
_______ may limit the frequency of scanning. For example, the scanning system may only be capable of performing a certain number of scans per day and organizations may need to adjust scan frequency to ensure that all scans complete successfully.
Technical Constraints
______ may limit the organization from conducting resource-intensive vulnerability scans during periods of high business activity to avoid disruption of critical processes.
Business Constraints
_______ may curtail the bandwidth consumed by the scanner or the number of scans that may be conducted simultaneously.
Licensing Limitations
Why is it important to conduct regular configuration reviews of vulnerability scanners?
It ensures the scan settings match current requirements.
It is important to conduct regular ______ of vulnerability scanners to ensure that scan settings match current requirements.
configuration reviews
________ typically only retrieve info from target servers and do not make changes to the server itself.
Credential Scans
Each ________, conducts the scan from a different location on the network, providing a different view into vulnerabilities.
Scan perspectives
The ___________ is an effort by the security community led by the NIST, to create a standardized approach for communicating security-related information.
Security Content Automation Process (SCAP)
________ provides the standard nomenclature for discussing system configuration issues.
Common Configuration Enumeration (CCE)
_______ provides a standard nomenclature for describing product names and versions.
Common Platform Enumeration (CPE)
____ provides a standard nomenclature for describing security-related software flaws.
Common Vulnerabilities and Exposures (CVE)
________ provides a standard approach for measuring and describing the severity of security-related software flaws.
Common Vulnerability Scoring System (CVSS)
_______ - a language for specifying checklists and reporting checklist results.
Extensible Configuration Checklist Description Format (XCCDF)
________ - A language for specifying low-level testing procedures used by checklists.
Open Vulnerability and Assessment Language (OVAL)
______ analyzes code for vulnerabilities without executing it.
Static Testing
_____ executes code as part of the test, running all the interfaces that the code exposes to the user with a variety of inputs, searching for vulnerabilities.
Dynamic Testing