Implementing Vulnerability Scanning Methods Flashcards

1
Q

International Organization for Standardization(ISO)

A

Develops many standards and frameworks governing the use of computers, networks, and telecommunications, including ones for information security (27K series) and risk management (31K series).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Open Web Application Security Project(OWASP)

A

A charity and community publishing a number of secure application development resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Center of Internet Security(CIS)

A

A not-for-profit organization (founded partly by SANS). It publishes the well-known “Top 20 Critical Security Controls” (or system design recommendations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Payment Card Industry Data Security Standard(PCI DSS)

A

Information security standard for organizations that process credit or bank card payments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIS Benchmarks

A

These best practices are maintained by a group of public and private sector security experts working with organizations to improve their information systems security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability Scanner

A

Hardware or software configured with a list of known weaknesses and exploits and can scan for their presence in a host OS or particular application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fingerprinting

A

Identifying the type and version of an operating system (or server application) by analyzing its responses to network scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Static Analysis

A

The process of reviewing uncompiled source code either manually or using automated tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dynamic Analysis

A

Software testing that examines code behavior during runtime. It helps identify potential security issues, potential performance issues, and other problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fuzzing

A

A dynamic code analysis technique that involves sending a running application random and unusual input so as to evaluate how the app responds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reverse Engineering

A

The process of analyzing the structure of hardware or software to reveal more about how it functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Configuration Baseline

A

details the recommended settings for services and policy configuration for a device or software operating in a specific role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Operational Technology(OT)

A

Communications network designed to implement an industrial control system rather than data networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Industrial Control Systems(ICSs)

A

Network managing embedded devices (computer systems that are designed to perform a specific, dedicated function).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Human-Machine Interfaces(HMIs)

A

Input and output controls on a PLC to allow a user to configure and monitor the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Supervisory Control and Data Acquisition(SCADA)

A

Type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographically large areas from a host computer.

17
Q

Programmable Logic Controllers(PLCs)

A

Type of processor designed for deployment in an industrial or outdoor setting that can automate and monitor mechanical systems.