Lesson 8: Explain Vulnerability Management Flashcards

1
Q

What are examples of common OS vulnerabilities?

A

MS17-010 (Windows),

Stagefright (Android),

Heartbleed (Linux).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do EOL (End-of-Life) and legacy systems pose security risks?

A

Because they are still being used despite lacking updates or not receiving support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are examples of firmware vulnerabilities?

A

Meltdown, Spectre, and LoJax.

Meltdown: Exploits a flaw in how CPUs handle memory access, allowing a program to bypass security boundaries and access data from other processes and the operating system.

Spectre: Exploits speculative execution, a CPU optimization technique, to force a program to leak its own data or data from other processes.

LoJax: A malicious UEFI rootkit, a persistent piece of malware that can bypass security measures like Secure Boot and persist on a system even after anti-malware software is installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are risks associated with virtualization vulnerabilities?

A

VM escape, resource reuse, and hypervisor exploits (e.g., “Cloudburst”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a zero-day vulnerability?

A

A flaw in software or hardware that is unknown to the vendor or security community, meaning no patch or fix is available, making it immediately exploitable by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do misconfigurations create security gaps?

A

Misconfigurations, or incorrect settings in systems and applications, create security gaps by exposing sensitive data, allowing unauthorized access which increases the attack surface, making it easier for attackers to exploit vulnerabilities.
Misconfigurations can be created by using Default Settings, or improper troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are SQL Injection and Cross-Site Scripting (XSS)?

A

SQL Injection: Exploits unsecure query processing.

XSS: Allows scripts to execute with the same permissions as trusted sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are examples of cloud-based attacks?

A

Exploiting misconfigurations or side-channel attacks.

Using cloud resources for cryptojacking or hosting malicious content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What role do Cloud Access Security Brokers (CASBs) play?

A

They enforce policies to secure cloud usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Software Bill of Materials (SBOM)?

A

A detailed inventory of software components for transparency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What tools aid in dependency monitoring?

A

Tools like OWASP Dependency-Check analyze third-party libraries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is vulnerability scanning used for?

A

Locating issues like missing patches and configuration errors.
Application-specific scanning identifies software vulnerabilities (e.g., XSS, SQLi).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of vulnerability scanning tools?

A

Nessus and OpenVAS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between credentialed and non-credentialed scans?

A

Credentialed scans: Use authentication to access system details.

Non-credentialed scans: Analyze vulnerabilities without authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of threat feeds in vulnerability identification?

A

To provide real-time updates, providing insights into emerging threats.

They combines open-source and proprietary insights to enhance scanning tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are key information sources for threat intelligence?

A

OSINT (Open-Source Intelligence) for emerging vulnerabilities.

Deep and dark web counterintelligence for insights into threat actor behavior.

17
Q

What factors are considered in vulnerability analysis?

A

Prioritization: considers severity and exploitation

Environmental: Industry regulations, IT infrastructure diversity, and threat landscape

Risk Tolerance: Align efforts with acceptable risk levels

18
Q

How does risk tolerance impact vulnerability analysis?

A

It aligns efforts with acceptable levels of risk, prioritizing mitigation strategies based on organizational thresholds.

19
Q

What are remediation practices for vulnerabilities?

A

Patching: addresses issues systematically across applications and devices.

Segmentation and Compensating Controls: Limits breach impact and establishes temporary safeguards.

Insurance: provides financial protection for cyber incidents.

20
Q

What validation methods ensure effective remediation?

A

Re-Scanning: confirms fixes are effective.

Audits and Verification: ensure consistency and functionality.

21
Q

What elements are included in vulnerability reporting?

A

Comprehensive reports clarify severity (via CVSS scores) and recommended mitigations.

Include potential impacts and actionable recommendations.