Chapter 13 - Vulnerability Assessment And Data Security Flashcards

1
Q

Vulnerability assessment

A

A systematic and methodical evaluation of the security posture of the enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5 parts of vulnerability assessment

A

1) asset identification
2) threat evaluation
3) vulnerability appraisal
4) risk assessment
5) risk mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset identification

A

Inventory the assets.

Determine the assets relative value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat evaluation

A

Classify threats by category.

Design attack tree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability appraisal

A

Determine current weaknesses in protecting assets.

Use vulnerability assessment tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk assessment

A

Estimate impact of vulnerability on organization.

Calculate risk likelihood and impact of the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk mitigation

A

Decide what to do with the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol analyzer

A

Hardware or software that captures packets to decode and analyze their contents. Ex. Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability scanner

A

Generic term for a range of products that look for vulnerabilities in networks or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Active scanner

A

A vulnerability scanner that sends “probes” to network devices and examines the responses received back to evaluate whether a specific device needs remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passive scanner

A

A vulnerability scanner that can identify the current software operating systems and applications being used on the network, and indicate which devices might have a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Honeypot

A

A computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, but are actually imitations of real data files, to trick attackers into revealing their attack techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeynet

A

A network set up with intentional vulnerabilities to invite attacks and reveal attackers’ methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Banner grabbing

A

Gathering information from messages that a service transmits when another program connects to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless cracker

A

Hardware or software that tests the security of a wireless LAN system by attempting to break its protections of Wi-Fi Protected Access (WPA) or WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password cracker

A

Software intended to break the digest of a password to determine its strength.

17
Q

Nmap (network mapper)

A

A security vulnerability scanner that can determine which devices are connected to the network and the services they are running.

18
Q

Netcat

A

A command-line alternative to Nmap with additional features scanning for vulnerabilities.

19
Q

Vulnerability scan

A

An automated software search through a system for any known security weaknesses that creates a report of those potential exposures.

20
Q

Intrusive vulnerability scan

A

A scan that attempts to penetrate the system in order to perform a simulated attack.

21
Q

Non-intrusive vulnerability scan

A

A scan that uses only available for information to hypothesize the status of the vulnerability.

22
Q

Credentialed vulnerability scan

A

A scan that provides credentials (user name and password) to the scanner so that tests for additional internal vulnerabilities can be performed.

23
Q

Penetration testing

A

A test (pentest) by an outsider that attempts to actually exploit any weaknesses in systems that are vulnerable.

24
Q

Black box test

A

A penetration test in which the tester has no prior knowledge of the network infrastructure that is being tested.

25
Q

White box test

A

A penetration test where the tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications.

26
Q

Gray box test

A

A penetration test where some limited information has been provided to the tester.

27
Q

Active reconnaissance

A

Actively proving a system like an attacker would do to find information.

28
Q

Passive reconnaissance

A

Using searches online for publicly accessible information that can reveal valuable insight about a system.