Lesson 5: Analyzing Vulnerability Scans Flashcards

1
Q

dpkg -l | grep chkrootkit is used to

A

find if the chkrootkit file is installed on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

locate chkrootkit is used to

A

find the chkrootkit file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

echo $PATH is used to check if the /usr/sbin:

A

path is known to the command interpreter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

chkrootkit is used to

A

detect rootkits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Common Vulnerability Scoring System (CVSS) is an industry-standard for

A

assessing the severity of security vulnerabilities. It provides a technique for scoring each vulnerability on a variety of measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The attack vector metric describes how an attacker would exploit the vulnerability there are 4 of them?

A

Physical (P)
Local (L)
Adjacent Network (A)
Network (N)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The attack complexity metric describes

A

the difficulty of exploiting the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The privileges required metric describes the type of

A

account access that an attacker would need to exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The user interaction metric describes whether the attacker needs to

A

involve another human in the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The confidentiality metric describes the type of

A

information disclosure that might occur if an attacker successfully exploits the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The integrity metric describes the type of

A

information alteration that might occur if an attacker successfully exploits the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When a scanner reports a vulnerability that does not exist, this is known as a

A

false positive error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a vulnerability scanner reports a vulnerability, this is known as a positive report. This report may either be an accurate

A

(true positive report) or inaccurate (a false positive report).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a scanner reports that a vulnerability is not present, this is know as a

A

negative report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Buffer overflow: when an attacker manipulates a program into placing

A

more data into an area of memory than is allocated for that program’s use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The goal of Buffer Overflow is to overwrite other information in memory with

A

instructions that may be executed by a different process running on the system.

17
Q

Privilege escalation attacks exploit vulnerabilities that allow the

A

transformation of a normal user account into a more privileged account, such as the root superuser account.

18
Q

Rootkits are hacking tools designed to automate

A

privilege escalation attacks.

19
Q

Remote code execution allows the attacker to exploit the vulnerabilities over

A

a network connection without having physical or logical access to the target system.

20
Q

Insecure Protocol Use

A

THIS IS WHERE YOU STOPPED

21
Q

When an attacker has access to a single virtual host and then manages to leverage that access to intrude on resources assigned to a different virtual machine.

A

VM escape attack

22
Q

When an attacker embeds scripting commands on a website that will later be executed by an unsuspecting visitor accessing the site.

A

Cross-site scripting (XSS) attack