Lecture 4 Flashcards

1
Q

What is the main purpose of prerequisites in Vulnerability Assessment (VA)?

A

To ensure the smooth conduct of the Vulnerability assessment

Prerequisites help in organizing the assessment effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the importance of target scoping in Vulnerability Assessment?

A

Defines what will be assessed

A proper scope prevents scope creep, customer dissatisfaction, and legal trouble.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Asset Table in the context of Vulnerability Assessment?

A

A list of critical assets that need to be assessed

It should include all relevant assets, although not every asset may be practically included.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What 3 factors determine asset criticality?

A
  • Asset’s monetary value
  • Legal standing
  • Importance to the organization

Critical assets include hardware, servers, sensitive information, and business trade secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Communication lines
  • E-commerce platforms
  • Internet-facing websites

Within the context of an enterprise, these assets are considered ________

A

Critical

These assets must be included in the vulnerability assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Applications and application APIs
  • Mail servers
  • Database servers
  • Web servers

Within the context of an enterprise, these assets are considered ________

A

Critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are non-critical assets in Vulnerability Assessment?

A

Assets that are usually ignored but could be exploited by attackers

Examples include security cameras, smart devices, printers, and wireless access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Security compliance desired by the customer
  • Requirements and code of conduct
  • List of subnets in the scope

How do these points relate to meeting customers?

A

These are ideal learning outcomes when meeting a customer.

This ensures clarity on the customer’s needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Network security devices in scoped network segments
  • Assets to scan and their IP range

How do these points relate to meeting customers?

A

These are ideal learning outcomes when meeting a customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the data lifecycle?

A

Creation -> Classification -> Access Control Management -> Destruction

Understanding the lifecycle is essential for effective data governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: A detailed outline of the scope will help the _______ plan resources and a time schedule.

A

vulnerability assessment team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly