Module 05 - Vulnerability Analysis ( EC Mode ) Flashcards
Which of the following phases of the vulnerability management lifecycle provides clear visibility into a firm and allows security teams to check whether all the previous phases have been perfectly employed?
A. Monitoring
B. Verification
C. Remediation
D. Risk Assessment
Answer: B. Verification
Explanation:
Remediation: Remediation is the process of applying fixes on vulnerable systems in order to reduce the impact and severity of vulnerabilities
Monitoring: Organizations need to performed regular monitoring to maintain system security. Continuous monitoring identifies potential threats and any new vulnerabilities that have evolved.
Verification: This phase provides clear visibility into the firm and allows the security team to check whether all the previous phases have been perfectly employed or not.
Risk Assessment: All serious uncertainties that are associated with the system are assessed and prioritized, and remediation is planned to permanently eliminate system flaws.
Which of the following online resources helps an attacker in performing vulnerability research?
A. EZGif
B. GNUnet
C. AOL
D. MITRE CVE
Answer: D. MITRE CVE (Common Vulnerabilities and Exposures)
Explanation:
AOL: AOL is a major search engine tool.
MITRE CVE: MITRE maintains a CVE databas
e that contains details of the latest vulnerabilities. Attackers can search MITRE CVE to discover vulnerabilities that exist in the target system.
EZGif: EZGif is an online GIF maker, image editor, and video analysis tool.
GNUnet: GNUnet is an online deep and dark web searching tool.
Given below are the different steps involved in the post-assessment phase of vulnerability management.
- Remediation
- Monitoring
- Risk assessment
- Verification
What is the correct sequence of steps involved in the post-assessment phase?
A. 2 -> 1 -> 3 -> 4
B. 1 -> 2 -> 3 -> 4
C. 3 -> 1 -> 4 -> 2
D.3 -> 2 -> 4 -> 1
Answer: C. 3 -> 1 -> 4 -> 2
Explanation:
The post-assessment phase of vulnerability management includes the following steps
Risk Assessment
Remediation
Verification
Monitoring
Which of the following terms refers to the existence of a weakness, design flaw, or implementation error that can lead to an unexpected event compromising the security of the system?
A. Exploit
B. Zero-day attack
C. Hacking
D. Vulnerability
Answer: D. Vulnerability
Explanation:
Exploit refers to a breach in a system. Attackers take advantage of a vulnerability or weakness in the system to exploit it. Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to the system resources. A zero-day attack is an attack that exploits computer application vulnerabilities before the software developer releases a patch for the vulnerability.
A newly discovered flaw in a software application would be considered as which kind of security vulnerability?
A. Zero-day vulnerability
B. HTTP header injection vulnerability
C. Input validation flaw
D. Time-to-check to a time-to-use flaw
Answer: A. Zero-day vulnerability
Explanation:
A zero-day vulnerability is a flaw that leaves software, hardware, or firmware defenseless against an attack that occurs the very same day the vulnerability is discovered.
Which among the following is not a metric for measuring vulnerabilities in common vulnerability scoring system (CVSS)?
A. Environmental metrics
B. Base metrics
C. Temporal metrics
D. Active metrics
Answer: D. Active metrics
Explanation:
CVSS assessment consists of three metrics for measuring vulnerabilities:
Base metrics: It represents the inherent qualities of a vulnerability.
Temporal metrics: It represents the features that keep on changing during the lifetime of a vulnerability.
Environmental metrics: It represents the vulnerabilities that are based on a particular environment or implementation.
Which of the following terms is referred to as a weakness in the design or implementation of a system or software that can be exploited to compromise its security?
A. Footprinting
B. Vulnerability
C. Information assurance
D. Natural threat
Answer: B. Vulnerability
Explanation:
Natural Threats: Natural factors such as fires, floods, power failures, lightning, meteor, and earthquakes are potential threats to the assets of an organization.
Vulnerability: A vulnerability refers to a weakness in the design or implementation of a system that can be exploited to compromise the security of the system. It is frequently a security loophole that enables an attacker to enter the system by bypassing user authentication.
Footprinting: Footprinting, the first step in ethical hacking, refers to the process of collecting information about a target network and its environment.
Information assurance: IA refers to the assurance of the integrity, availability, confidentiality, and authenticity of information and information systems during the usage, processing, storage, and transmission of information.
Williams, a professional hacker, targeted an organization’s network to cause data loss at a massive scale. To achieve his goal, he exploited a system running an older version of a web browser. Williams implanted a Trojan on the target browser, through which he made a lateral movement in the target network.
Identify the type of vulnerability exploited by Williams in the above scenario.
A. Insecure or poor design of the network and application
B. Intentional end-user acts
C. End-user carelessness
D. Inherent technology weaknesses
Answer: D. Inherent technology weaknesses
Explanation:
End-user carelessness: End-user carelessness considerably impacts network security. Human behavior is fairly susceptible to various types of attacks and can be exploited to effect serious outcomes, including data loss and information leakage.
Intentional end-user acts: Ex-employees who continue to have access to shared drives can misuse them by revealing the company’s sensitive information. Such an act is called an intentional end-user act and can lead to heavy data and financial losses for the company.
Internet service misconfiguration: Misconfiguring internet services can pose serious security risks. For example, enabling JavaScript and misconfiguring IIS, Apache, FTP, and Terminal services, can create security vulnerabilities in the network.
Inherent technology weaknesses: If the hardware or software is not capable of defending the network against certain types of attacks, the network will be vulnerable to those attacks. Certain hardware, applications, or web browsers tend to be prone to attacks such as DoS or man-in-the-middle attacks.
Finch, a security professional, was tasked with assessing their organizational network. In this process, Finch identified that one of the servers connected to the corporate network used the insecure FTP for file transmission, which can pose serious security risks.
Identify the type of vulnerability identified by Finch in the above scenario.
A. TCP/IP protocol vulnerability
B. Operating system vulnerability
C. Network device vulnerability
D. User account vulnerabilities
Answer: A. TCP/IP protocol vulnerability
Explanation:
Here are some technological vulnerabilities:
TCP/IP protocol vulnerabilities:
HTTP, FTP, ICMP, SNMP, SMTP are inherently insecure
Operating system vulnerabilities:
An OS can be vulnerable because:
It is inherently insecure
It is not patched with the latest updates
Network device vulnerabilities:
Various network devices such as routers, firewall, and switches can be vulnerable due to:
Lack of password protection
Lack of authentication
Insecure routing protocols
Firewall vulnerabilities
Clark, an IT professional, was hired by an MNC on a contract basis. After a few months, the management became dissatisfied with Clark’s performance and asked him to serve a notice period. Clark decided to seek revenge on the company after serving the notice period. On the last working day, he accessed the company’s shared drive and revealed secrets to a third party, causing huge financial loss to the company.
Identify the cause of the vulnerability discussed in the above scenario.
A. Inherent technology weaknesses
B. Hardware or software misconfiguration
C. Intentional end-user acts
D. End-user carelessness
Answer: C. Intentional end-user acts
Explanation:
Hardware or software misconfiguration: The insecure configuration of the hardware or software in a network can lead to security loopholes. For example, a misconfiguration or the use of an unencrypted protocol may lead to network intrusions, resulting in the leakage of sensitive information.
Inherent technology weaknesses: If the hardware or software is not capable of defending the network against certain types of attacks, the network will be vulnerable to those attacks. Certain hardware, applications, or web browsers tend to be prone to attacks such as DoS or man-in-the-middle attacks.
End-user carelessness: End-user carelessness considerably impacts network security. Human behavior is fairly susceptible to various types of attacks and can be exploited to effect serious outcomes, including data loss and information leakage.
Intentional end-user acts: Ex-employees who continue to have access to shared drives can misuse them by revealing the company’s sensitive information. Such an act is called an intentional end-user act and can lead to heavy data and financial losses for the company.
What is the correct order for vulnerability management life cycle?
A. Verification → risk assessment → monitor → remediation → creating baseline → vulnerability assessment
B. Verification → vulnerability assessment → monitor → remediation → creating baseline → risk assessment
C. Monitor → risk assessment → remediation → verification → creating baseline → vulnerability assessment
D. Creating baseline → vulnerability assessment → risk assessment → remediation → verification → monitor
Answer: D. Creating baseline → vulnerability assessment → risk assessment → remediation → verification → monitor
Explanation:
Vulnerability management life cycle is an important process that helps in finding and remediating security weaknesses before they are exploited. The correct order of vulnerability management life cycle is
Creating baseline → vulnerability assessment →risk assessment → remediation →verification →monitor.
Which of the following terms refers to the process of reducing the severity of vulnerabilities in the vulnerability management life cycle?
A. Risk assessment
B. Vulnerability assessment
C. Remediation
D. Verification
Answer: C. Remediation
Explanation:
Vulnerability management life cycle is an important process that helps in finding and remediating security weaknesses before they are exploited. This includes defining the risk posture and policies for an organization, creating a complete asset list of systems, scanning and assessing the environment for vulnerabilities and exposures, and taking action to mitigate the vulnerabilities that are found.
The phases involved in vulnerability management are:
Creating Baseline
In this phase, critical assets are identified and prioritized to create a good baseline for the vulnerability management.
Vulnerability Assessment
This is a very crucial phase in vulnerability management. In this step, the security analyst identifies the known vulnerabilities in the organization infrastructure.
Risk Assessment
In this phase, all the serious uncertainties that are associated with the system are assessed, fixed, and permanently eliminated for ensuring a flaw free system.
Remediation
Remediation is the process of reducing the severity of vulnerabilities. This phase is initiated after the successful implementation of the baseline and assessment steps.
Verification
This phase provides a clear visibility into the firm and allows the security team to check whether all the previous phases are perfectly employed or not.
Monitor
Regular monitoring needs to be performed for maintaining the system security using tools such as IDS/IPS, firewalls, etc.
Don, a professional hacker, was attempting to access an organization’s systems from a remote location. Don scanned the target environment and identified a security loophole in the firewall implementation. He exploited this loophole to intrude into and gain access to all the interconnected systems within the environment.
Identify the type of vulnerability exploited by Don in the above scenario.
A. Inherent technology weaknesses
B. Insecure or poor design of the network and application
C. End-user carelessness
D. Intentional end-user acts
Answer: B. Insecure or poor design of the network and application
Explanation:
End-user carelessness: End-user carelessness considerably impacts network security. Human behavior is fairly susceptible to various types of attacks and can be exploited to effect serious outcomes, including data loss and information leakage.
Intentional end-user acts: Ex-employees who continue to have access to shared drives can misuse them by revealing the company’s sensitive information. Such an act is called an intentional end-user act and can lead to heavy data and financial losses for the company.
Insecure or poor design of network and application: An improper and insecure design of a network may make it susceptible to various threats and potential data loss. For example, if firewalls, IDS, and virtual private network (VPN) technologies are not implemented securely, they can expose the network to numerous threats.
Inherent technology weaknesses: If the hardware or software is not capable of defending the network against certain types of attacks, the network will be vulnerable to those attacks. Certain hardware, applications, or web browsers tend to be prone to attacks such as DoS or man-in-the-middle attacks.
Steve, an administrator, installed new software on an employee’s system but forgot to change the credentials provided by the vendor. Greg, an attacker, browsed online resources and obtained vendor-provided software credentials to gain remote access to the employee’s system.
Identify the type of vulnerability exploited by Greg in the above scenario.
A. TCP protocol vulnerabilities
B. Default password and settings
C. Operating system vulnerabilities
D. IP protocol vulnerabilities
Answer: B. Default password and settings
Explanation:
Here are the two types of vulnerabilities listed and their descriptions:
Configuration Vulnerabilities:
Default password and settings:
Leaving the network devices/products with their default passwords and settings can lead to unauthorized access to the device and the network.
Network device misconfiguration:
Misconfiguring the network device
Technological Vulnerabilities:
TCP/IP protocol vulnerabilities: HTTP, FTP, ICMP, SNMP, SMTP are inherently insecure
Operating System vulnerabilities:
An OS can be vulnerable because:
It is inherently insecure
It is not patched with the latest updates
Peter, a security professional, was tasked with performing a vulnerability assessment on an organization’s network. During the assessment, Peter identified that an Apache server was improperly configured, potentially posing serious threats to the organization.
Identify the type of vulnerability identified by Peter in the above scenario.
A. Default password and settings
B. Internet service misconfiguration
C. User account vulnerabilities
D. Network device misconfiguration
Answer: B. Internet service misconfiguration
Explanation:
Here are the Configuration Vulnerabilities and their descriptions:
User account vulnerabilities:
Originating from the insecure transmission of user account details such as usernames and passwords, over the network
System account vulnerabilities:
Originating from setting of weak passwords for system accounts
Internet service misconfiguration:
Misconfiguring internet services can pose serious security risks. For example, enabling JavaScript and misconfiguring IIS, Apache, FTP, and Terminal services, can create security vulnerabilities in the network
Default password and settings :
Leaving the network devices/products with their default passwords and settings
Network device misconfiguration:
Misconfiguring the network device
Which of the following types of software vulnerability occurs due to coding errors and allows attackers to gain access to the target system?
A. Misconfiguration
B. Unpatched servers
C. Buffer overflow
D. Open services
Answer: C. Buffer overflow
Explanation:
Open services: Open ports and services may lead to the loss of data or DoS attacks and allow attackers to perform further attacks on other connected devices.
Unpatched Servers: Unpatched servers are a hub for the attackers, they serve as an entry point into the network. This can lead to the exposure of private data, financial loss, and discontinuation of operations.
Buffer overflow: Buffer overflows are common software vulnerabilities that happen due to coding errors that allow attackers to gain access to the target system.
Misconfiguration: Misconfiguration is the most common vulnerability and is mainly caused by human error, which allows attackers to gain unauthorized access to the system.