Conducting Vulnerability Assessments Flashcards

1
Q

Pre-assessmet Checklist

A
  • Scope of project
  • Identify assessment team
  • Establish applicable standards
  • Select site(s)
  • Dates and logistics
  • The team needs EPP ?
  • Ground rules
  • Gather and review existing documentation
  • Research known vulnerabilities
  • Prepare for kickoff
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive Data Collection Includes:

A
  • Windows system information
  • Log files
  • Firewall, router and switch configuration files
  • Network packet captures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advanced Windows System Information Tools

A
  • SIW
  • Priority Speccy
  • AIDA
  • ASTRA
  • PC Wizard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sniffing Ethernet

A

Sniffing the ethernet is a term used to describe the passive collection of data in packet capture programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PORT Mirroring

A

Also known as SPAN (Switched Port Analyzer), is a method of monitoring network traffic. With port mirroring enabled, the switch sends a copy of all network packets seen on one port to another port, where the packet can be analyzed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RSPAN

A

Remote Switched Port Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Popular network capturing tools

A
  • Whireshark
  • Colasoft
  • TCP Dump
  • NetworkMiner
  • Microsoft Network Monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Packet capturing Goals

A
  • Identify what devices talk to what
  • Identify the protocols on the network
  • Detect unexpected or unusual traffic
  • Recognize messages with clear-text payloads
  • Troubleshooting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Vulnerability Scanning Tools

A
  • Nessus
  • Nexpose
  • OpenVas
  • Qualsys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Metasploit, Kali LInux and Canvas are tools for:

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the different types of vulnerability assessment?

A
  1. High-level GAP Assessments
  2. Passive Vulnerability Assessments
  3. Active Vulnerability Assessments
  4. Penetration Testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the different types of vulnerability assessment?

A
  1. High-level GAP Assessments
  2. Passive Vulnerability Assessments
  3. Active Vulnerability Assessments
  4. Penetration Testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the puprose of a packet capture utility?

A
  • Identify what devices talk to what
  • Identify protocols on the network
  • Detect unexpected or unusual traffic
  • Recognize messages with clear-text payloads
  • Troubleshooting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is port mirroring?

A

Is an approach to monitoring network traffic that involves forwarding a copy of each packet from one network switch port to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of tool is used to capture and display Ethernet communications?

A

Packet Capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A feature that sends a copy of a network from one or more switch ports to a special monitoring port is called:

A

Port mirroring

17
Q

Which term is used to describe the passive collection of data in packet capture programs?

A

Sniffing the Ethernet

18
Q

Which computer program assesses computers, computer system, networks or applications for weaknesses against databases known vulnerabilites?

A

Network Vulnerability Scanning Tool

19
Q

Which is an approach to monitoring network traffic that involves forwarding a copy of each data packet from one network switch port to another?

A

Port Mirroring