Endpoint Vulnerability Flashcards

1
Q

In profiling a server, what defines what an application is allowed to do or run on a server?

A

Service Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which metric class in the CVSS Basic Metric Group identifies the impacts on confidentiality, integrity, and availability?

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which statement describes the threat-vulnerability (T-V) pairing?

A

It is the identification of threats and vulnerabilities and the matching of threats with vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When establishing a server profile for an organization, which element describes the type of service that an application is allowed to run on the server?

A

Service Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the steps in the vulnerability management life cycle?

A

Discover, prioritize assets, assess, report, remediate, verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which security management function is concerned with the inventory and control of hardware and software configurations of systems?

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In addressing an identified risk, which strategy aims to decrease the risk by taking measures to reduce vulnerability?

A

Risk Reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?

A

Discover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the core functions of the NIST Cybersecurity Framework?

A

Identify, protect, detect, respond, recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which security management function is concerned with the implementation of systems that track the location and configuration of networked devices and software across an enterprise?

A

Asset Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a network baseline is being established for an organization, which network profile element indicates the time between the establishment of a data flow and its termination?

A

Session Duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which class of metric in the CVSS Base Metric Group defines the features of the exploit such as the vector, complexity, and user interaction required by the exploit?

A

Exploitability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly