Chapter 6 Vulnerability Assessment and Pentrest Tools Mark B Flashcards
When performing a SCAP scan on a system, which of the following types of scans will be most useful?
A. Credentialed
B. Non-credentialed
C. Agent based
D. Intrusive
A. Credentialed
What would be the most important when monitoring on ICS networks, where latency must be minimized?
A. Group Policy
B. Active Scanning
C. Passive Scanning
D. Continuous Integration
C. Passive Scanning
What is the protocol that allows for the automation of security compliance scans?
A. SCAP
B. CVSS
C. CVE
D. ARF
A. SCAP
What standard would support the creation of XML-format configuration templates?
A. XCCDF
B. CVE
C. CPE
D. NMAP
A. XCCDF
What standard allows a vulnerability scanner to detect the host operating system and installed applications?
A. XCCDF
B. CVE
C. CPE
D. SCAP
C. CPE
What standard supports a common reporting standard for vulnerability scanning?
A. XCCDF
B. CVE
C. OVAL
D. STIG
C. OVAL
What information type can be found at MITRE and NIST VD that describes a known vulnerability and gives information regarding remediation?
A. CVE
B. CPE
C. CVSS
D. OVAL
A. CVE
What is used to calculate the criticality of a known vulnerability?
A. CVE
B. CPE
C. CVSS
D. OVAL
C. CVSS
If my organization is preparing to host publicly available SaaS services in the data center, what kind of assessment would be best?
A. Self-assessment
B. Third party assessment
C. PCI compliance
D. Internal assessment
B. Third party assessment
When we download patches from Microsoft, where should they be tested first?
A. Staging network
B. Production network
C. DMZ network
D. IT administration network
A. Staging network
Where can security professionals go to remain aware of vendor published security updates and guidance? (Choose all that apply)
A. Advisories
B. Bulletins
C. Vendor websites
D. MITRE
A. Advisories
B. Bulletins
C. Vendor websites
What allows European critical infrastructure providers to share security related information?
A. ISACs
B. NIST
C. SCAP
D. CISA
A. ISACs
What kind of testing would be performed against uncompiled code?
A. Static analysis
B . Dynamic analysis
C. Fuzzing
D. Reverse engineering
A. Static analysis
What type of analysis would allow researchers to measure power usage to predict the encryption keys generated by a crypto processor?
A. Side channel analysis
B. Frequency analysis
C. Network analysis
D. Hacking
A. Side channel analysis
What type of analysis would most likely be used when researched need to study third party compiled code?
A. Static analysis
B. Side channel analysis
C. Input validation
D. Reverse engineering
D. Reverse engineering