Review 7 Flashcards

1
Q

Which resource for ethical hackers combines the diverse ideas and perspectives from professionals, academics, and government sources to create a unified standard for cybersecurity?

Question options:

CAPEC

NVD

CVE

CWE

A

CWE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which vulnerability assessment tool is meant for smaller organizations and offers comprehensive scanning?

Question options:

Nessus

Nikto

Qualsys

OpenVAS

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____________ should be implemented in every organization to identify, evaluate, and control risks and vulnerabilities.

Question options:

Risk management

Vulnerability assessment

Active assessment

Vulnerability management

A

Vulnerability management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the first step in the Vulnerability Management Life Cycle?

Question options:

Risk assessment

Monitoring

Baseline creation

Vulnerability assessment

A

Baseline creation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of assessment focuses on all types of user risks, including:

Malicious users
Uneducated users
Vendors
Administrators
Databases
Firewalls
Files
Web servers
Configuration errors
Question options:

Active

External

Host-Based

Internal

A

Host-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which step of the Vulnerability Management Life Cycle do you recommend ongoing monitoring and routine penetration testing to be proactive in protecting the organization and its customers or clients?

Question options:

Monitoring

Remediation

Risk assessment

Vulnerability assessment

A

Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of vulnerability assessment scan can simulate an attack to test for vulnerabilities and can repair weak points in the system?

Question options:

Passive Scan

External Scan

Internal Scan

Active Scan

A

Active Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which resource for ethical hackers has a list of standard identifiers, and can be used as a baseline for evaluation.

Question options:

NVD

CWE

CVE

CAPEC

A

CVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of assessment may include:

*Inspecting physical security
*Checking open ports on network devices and router configurations
*Scanning for Trojans, spyware, viruses, and malware
*Evaluating remote management processes
*Determining flaws and patches on the internal network systems, devices, and servers
Question options:

Host-Based

External

Passive

Internal

A

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which mobile device assessment tool identifies outdated versions of Apple IOS?

Question options:

Nessus

SecurityMetrics Mobile

Retina CS for Mobile

Network Scanner

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which resource for ethical hackers contains a dictionary of attack patterns?

Question options:

NVD

CVE

CWE

CAPEC

A

CAPEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which open-source vulnerability assessment tool has over 50,000 tests available?

Question options:

Qualsys

OpenVAS

Nessus

Nikto

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of vulnerability assessment scan tries to find vulnerabilities without directly interacting with the target network?

Question options:

External Scan

Passive Scan

Internal Scan

Active Scan

A

Passive Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In which step of the Vulnerability Management Life Cycle does penetration testing begin?

Question options:

Risk assessment

Baseline creation

Vulnerability assessment

Monitoring

A

Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an “operating system flaw”?

Question options:

Trojan horse

Out of date software

Broken authentication

Cross-site scripting

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly