Identifying Vulnerabilities Flashcards

1
Q

Explain Identifying Vulnerabilities

A

systematic practice of spotting and categorizing weaknesses in a system, network, or application that could potentially be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Vulnerability Scanning?

A

automated method of probing networks, systems and applications to discover potential vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Application Security?

A

used to safeguard our software from being manipulated during its lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Static Analysis?

A

Used in application Security

going to be used to analyze an application source code without actually running or executing that source code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Dynamic Analysis?

A

Used in Application security

evaluates an application as it’s being run to determine if there are any vulnerabilities inside of that application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Packaged Monitoring?

A

Used in application security

ensures that the libraries and components that your application depends on are secure and up to date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Penetration Testing?

A

used to simulate a real world attack on a system to evaluate its security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain System Process and Audits

A

process that involves conducting a comprehensive review of your information systems, security policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the steps of System Process and Audits?

A
  1. Plan to track vulnerabilities and deploy fixes
  2. Test patches and updates in a controlled environment
  3. Implement patches across devices and applications
  4. Audit to verify effective patch implementation and check for post-implementation issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly