Module 5 Flashcards

1
Q

define vulnerability assessment

A

the process of identifying, quantifying and prioritizing (or ranking) the security issues (vulnerabilities) in a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 items every organization needs to perform

A
    • risk assessment
    • vulnerability assessment
    • penetration testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a vulnerability

A

weakness or other issues that create a risk if exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 ways to address risk - out of ISO 270001

A
    • eliminate the risk
    • reduce the risk to an acceptable level (mitigate)
    • transfer the risk to a third party - (insurance)
    • accept the risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the main objective of a pen test

A

the main objective of pet testing is to determine security weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the primary goal of an external pen test

A

to gain unauthorized elevated access to an externally accessible system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a secondary goal of an external pen test

A

to gain unauthorized access to other systems utilizing the primary goal system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 goals to web app pen testing

A
  1. gain anonymous access to authenticated sections of the application
  2. gain access to other client data within the application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

vulnerability scans - how often

A

run internal and external scans at least quarterly and after significant changes in the network (new system components, changes in network topology, firewall rule modifications, product upgrades).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

pen testing goals

A
    • determine whether and how a malicious user can gain unauthorized access
    • to confirm the applicable controls are in place
    • identify ways to exploit vulnerabilities to circumvent or defeat the security features of system components
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what to do after a vulnerability test

A

correct any vulnerabilities found. testing is repeated to verify corrections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

change-detection mechanism – what does it do

A
  • – alert personnel to unauthorized modifications of critical system files, configuration files or content files.
  • – configure this software to perform the actions at least weekly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4 steps to risk assessment process

A
  1. prepare for assessment
  2. conduct assessment
  3. communicate results to senior leadership
  4. maintain assessment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

define vulnerability assessment

A

process of identifying, quantifying and prioritizing (or ranking) the security issues (vulnerabilities) in a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how often should you do internal pen testing

A

at least annually and after any significant infrastructure or application upgrade or modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what actions must be done once you find exploitable vulnerabilities found during pen test

A
    • they must be reviewed and corrected

- - testing should be repeated to verify corrections

17
Q

when placing IDS/IPS where are ideal locations to place these nodes

A
    • at the perimeter of the sensitive data environment

- - at critical points in the sensitive data environment

18
Q

change detection is for what

A

to alert personnel to unauthorized modifications of critical systems files, configuration files, or content files.

19
Q

how often should change detection perform critical file comparisons

A

at least weekly

20
Q

review firewall configurations how often

A

at least every 6 months

21
Q

identify the tool used for change-detection

A

file-integrity monitoring (FIM)

22
Q

who is responsible for the protection of individual assets and sensitive information

A

information security officer (ISO)