Chapter 8: Using Risk Management Tools Flashcards

1
Q

A ____ is the likelihood that a threat will exploit a vulnerability.

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ____ is a potential danger that can compromise confidentiality, integrity, or availability of data or a system.

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____ is a weakness.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ refers to the magnitude of harm that can be caused if a threat exercises a vulnerability.

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ ____ help an organization identify and categorize threats.

A

Threat assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An____ threat assessment evaluates the likelihood of an environmental threat, such as a natural disaster, occurring.

A

environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ threat assessments evaluate threats from humans.

A

Manmade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ threat assessments evaluate threats from within an organization.

A

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ threat assessment evaluates threats from outside an organization.

A

External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _____ is a flaw or weakness in software or hardware, or a weakness in a process that a threat could exploit, resulting in a security breach.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk management attempts to reduce risk to a level that an organization can accept, and the remaining risk is known as ____ risk.

A

residual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You can avoid a risk by not providing a service or participating in a risky activity. Purchasing insurance, such as fire insurance, transfers the risk to another entity. Security controls mitigate, or reduce, risks. When the cost of a control outweighs a risk, it is common to ____ ___ ____.

A

accept the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ___ _____ quantifies or qualifies risks based on different values or judgments. It starts by identifying asset values and prioritizing high-value items.

A

risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ risk assessments use numbers, such as costs and asset values.

A

Quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ___ ___ ___ is the cost of any single loss.

A

single loss expectancy (SLE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ____ __ ___ ____ indicates how many times the loss will occur annually.

A

annual rate of occurrence (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You can calculate the annual loss expectancy (ALE) as ___ x ____

A

SLE × ARO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____risk assessments use judgments to prioritize risks based on likelihood of occurrence and impact. These judgments provide a subjective ranking.

A

Qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ____ ____ is a detailed document listing information about risks. It typically includes risk scores along with recommended security controls to reduce the risk scores.

A

risk register

20
Q

A ____ ____ assessment evaluates a supply chain needed to produce and sell a product. It includes raw materials and all the processes required to create and distribute a finished product.

A

supply chain

21
Q

A ___ ___ scans systems for open ports and attempts to discover what services and protocols are running.

A

port scanner

22
Q

____ ____ identifies the IP addresses of hosts within a network.

A

Network mapping

23
Q

____ scanners expand on network mapping. They identify the operating system running on each host. They can also identify services and protocols running on each host.

A

Network

24
Q

____ scanners can detect rogue access points (APs) in a network. Many can also crack passwords used by the APs.

A

Wireless

25
Q

____ _____ queries remote systems to detect their operating system, along with services, protocols, and applications running on the remote system.

A

Banner grabbing

26
Q

_____ scanners passively test security controls to identify vulnerabilities, a lack of security controls, and common misconfigurations. They are effective at discovering systems susceptible to an attack without exploiting the systems.

A

Vulnerability

27
Q

A ___ positive from a vulnerability scan indicates the scan detected a vulnerability, but the vulnerability doesn’t exist.

A

false

28
Q

_____ scans run under the context of an account and can be more accurate than non- credentialed scans, giving fewer false positives.

A

Credentialed

29
Q

_____ testers should gain consent prior to starting a penetration test. A rules-of- engagement document identifies the boundaries of the test.

A

Penetration

30
Q

A ____ ___ is an active test that attempts to exploit discovered vulnerabilities. It starts with a vulnerability scan and then bypasses or actively tests security controls to exploit vulnerabilities.

A

penetration test

31
Q

_____ ____ gathers information from open-source intelligence. Active reconnaissance uses scanning techniques to gather information.

A

Passive reconnaissance

32
Q

After initial exploitation, a penetration tester uses ____ ____ techniques to gain more access.

A

privilege escalation

33
Q

____ during a penetration test is the process of using an exploited system to access other systems.

A

Pivoting

34
Q

In____ box testing, testers perform a penetration test with zero prior knowledge of the environment.____ box testing indicates that the testers have full knowledge of the environment, including documentation and source code for tested applications. ____ box testing indicates some knowledge of the environment.

A

black
White
Gray

35
Q

Scans can be either intrusive or non-intrusive.____ testing is intrusive (also called invasive) and can potentially disrupt operations.____ testing is non-intrusive (also called non-invasive).

A

Penetration

Vulnerability

36
Q

____frameworks store information about security vulnerabilities. They are often used by penetration testers (and attackers) to detect and exploit software.

A

Exploitation

37
Q

___ ____ (sniffers) can capture and analyze data sent over a network. Testers (and attackers) use protocol analyzers to capture cleartext data sent across a network.

A

Protocol analyzers

38
Q

Administrators use protocol analyzers for troubleshooting communication issues by inspecting protocol____ to detect manipulated or fragmented packets.

A

headers

39
Q

Captured_____ show the type of traffic (protocol), source and destination IP addresses, source and destination MAC addresses, and flags.

A

packets

40
Q

_____is a command-line protocol analyzer. Captured packet files can be analyzed in a graphical protocol analyzer such as Wireshark.

A

Tcpdump

41
Q

____is a sophisticated network scanner run from the command line. ____ is a command-line tool used to remotely administer servers; it can also be used for banner grabbing.

A

Nmap

Netcat

42
Q

Logs record events and by monitoring logs, administrators can detect event anomalies. Security logs track ___ and ___ activity on systems. System logs identify when services ___ and ___.

A

logon and logoff

start and stop

43
Q

Firewall and router logs identify the ___ and ____ of traffic.

A

source and destination

44
Q

A ____ ____ ____ ____ system can aggregate and correlate logs from multiple sources in a single location. It also provides continuous monitoring and automated alerting and triggers.

A

security information and event management (SIEM)

45
Q

_____ security monitoring helps an organization maintain its security posture, by verifying that security controls continue to function as intended.

A

Continuous

46
Q

____ auditing records user activities. These auditing reviews examine user activity.

A

User

47
Q

____ auditing reviews help ensure that users have only the rights and permissions they need to perform their jobs, and no more.

A

Permission