MODULE 5: Vulnerability Analysis Flashcards
What term describes an in-depth examination of the ability of a system or application to withstand exploitation?
Vulnerability Assessment
Regarding CVSS severety ratings, which range is classified as “medium”?
- 0
- 1-3.9
- 0-6.9
- 0-8.9
- 0-10.0
4.0-6.9
What is a publicly available and free list or dictionary of standardized identifiers for common software vulnerabilities and exposures?
Common Vulnerabilities and Exposures (CVE)
Arrange the following steps of the vulnerability management life cycle in order:
verification risk assessment identify assets and create baseline monitor vulnerability scan remediation
- identify assets and create baseline
- vulnerability scan
- risk assessment
- remediation
- verification
- monitor
The following actions should be taken during which step of the “Post Assessment Phase”
- rescan of systems to identify if applied fix has remediated the vulnerability
- perform dynamic analysis
- review of attack surface
a. risk assessment
b. verification
c. remediation
d. monitoring
b. verification
What type of vulnerability assessment conducts a configuration-level check to identify system configs, user directories, file systems, registry settings, ect. to evaluate the possibility of compromise?
a. active assessment
b. external assessment
c. host-based assessment
d. application assessment
e. passive assessment
f. internal assessment
g. network based assessment
h. database assessment
c. host-based assessment
Which type of vulnerability assessment is used to sniff the network traffic to discover present active systems, network services, applications, and vulnerabilities present?
a. active assessment
b. external assessment
c. host-based assessment
d. application assessment
e. passive assessment
f. internal assessment
g. network based assessment
h. database assessment
e. passive assessment
Which type of vulnerability assessment determines possible network security attacks that may occur on the organization’s system?
a. active assessment
b. external assessment
c. host-based assessment
d. application assessment
e. passive assessment
f. internal assessment
g. network based assessment
h. database assessment
g. network based assessment
Which type of vulnerability assessment determines the vulnerabilities in the organization’s wireless networks?
a. wireless network assessment
b. credentialed assessment
c. manual assessment
d. distributed assessment
e. non-credentialed assessment
f. automated assessment
a. wireless network assessment
Which type of vulnerability assessment assesses the network by obtaining the credentials of all machines present in the network?
a. wireless network assessment
b. credentialed assessment
c. manual assessment
d. distributed assessment
e. non-credentialed assessment
f. automated assessment
b. credentialed assessment
What type of vulnerability assessment starts by building an inventory of protocols found on the machine, detects which ports are attached to services, and then selects vulnerabilities on each machine?
a. tree-based assessment
b. interface-based assessment
b. Interface-Based Assessment
Which vulnerability assessment type is the best approach for vulnerability assessment?
a. tree-based assessment
b. interface-based assessment
b. interface-based assessment
Which category of vulnerability assessment tools finds and identifies the OS running on a particular host computer and tests it for known deficiencies and also searches for common applications and services?
a. scope assessment tools
b. active and passive tools
c. location and data examination tools
d. host based vulnerability assessment tools
e. depth assessment tools
f. application layer assessment tools
d. host based vulnerability assessment tools
What vulnerability assessment tool is useful for identifying vulnerabilities, configuration issues, and malware?
a. GFI LanGuard
b. Nessus
c. OpenVAS
b. Nessus
Which vulnerability assessment tool is a web server assessment tool that examines a web server to discover potential problems and security vulnerabilities?
a. Nikto
b. OpenVAS
c. GFI LanGuard
a. Nikto