Section 22 - Vulnerability Management Flashcards

1
Q

What is a vulnerability assessment?

A

Seeks to identify any issues in a network, application, database, or other systems prior to it being used that might compromise the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability assessments are a formalized process that ____, _____, and _____ the security holes in an enterprise network architecture.

A

define, identify and classify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is vulnerability management?

A

Practice of finding and mitigating the vulnerabilities in computers and networks

** This is the oversight process of vulnerability assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability management is a cyclical process. Sometimes you’ll hear it referred to as…?

A

Scan, Patch, Scan

*** This is because you’ll scan the network for vulnerabilities to identify them (SCAN) then you’ll prioritize, fix and patch them (PATCH) and you’ll scan again. You repeat this until there are no vulnerabilities left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is a vulnerability assessment conducted?

A

Most commonly, a vulnerability management program will be used inside of an organization ad they’ll choose what software you’re going to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the five basic concepts you need to know to summarize the vulnerability management process?

A
  1. Define the desired state of security
  2. Create a baseline
  3. Prioritize the vulnerabilities
  4. Mitigate vulnerabilities
  5. Monitor the network and systems and conduct future scans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a penetration test?

A

A test conducted by a team of professionals to simulate an attack on your network, its systems or its applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between black box, gray box and white box testing?

A

Black box = zero knowledge (the pentesters have to hunt for any information that they need in order to be able to penetrate the network’s defenses)

Gray box = Some knowledge

White box = Full knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between a penetration test and a vulnerability assessment?

A

A vulnerability assessment is conducted as a credentialed scan, where the tool can be provided with a username and password for the systems.

Penetration tests are going to be conducted in the form of a test (black, white or gray) where pentesters will simulate being an attacker who will attempt to get into your network and after the test is complete they will provide a report telling you what vulnerabilities were found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Penetration tests follow five basic steps. What are they?

A
  1. Get permission and document info
  2. Conduct reconnaissance
  3. Enumerate the targets
  4. Exploit the targets
  5. Document the results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a tabletop exercise (TTX)?

A

Exercise that uses an incident scenario against a framework of controls or a red team

*** This is a discussion of simulated emergency situations and security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a red team vs a blue team?

A

Red team = attacking your system in a penetration test

Blue team = defending your system in a penetration test

*** Teams can be external or internal meaning they can either be employees (internal) conducting the test or a third party (external.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a red team?

A

The hostile or attacking team in a penetration test or incident response exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a blue team?

A

The defensive team in a penetration test or incident response exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a white team?

A

Staff administering, evaluating, and supervising a penetration test or incident response exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is OVAL?

A

Open Vulnerability and Assessment Language

A standard designed to regulate the transfer of secure public information across networks and the internet utilizing any security tools and services available

*** This is an attempt to create a standard way for vulnerability management software, scanners, and other tools to share their data with each other and with other programs.

17
Q

OVAL is compromised of two different parts. What are they?

A

Language
Interpreter

18
Q

What is OVAL language?

A

An XML schema used to define and describe the information being created by OVAL to be shared among the various programs and tools

19
Q

What is an OVAL interpreter?

A

A reference developed to ensure the information passed around by these programs complies with the OVAL schemas and definitions used by the OVAL language

20
Q

What are the tools used to conduct vulnerability assessments?

A

Network mapping
Vulnerability scanning
Network sniffing
Password Analysis

21
Q

What is network mapping?

A

Discovery and documentation of physical and logical connectivity that exists in the network

22
Q

What does vulnerability scanning do?

A

A technique that identifies threats on the network without exploiting them

23
Q

What is banner grabbing?

A

A technique used to gain information about servers and inventory the systems or services

24
Q

What is Network Sniffing?

A

The process of finding and investigating other computers on the network by analyzing the network traffic or capturing the packets being sent

25
Q

Network sniffing tools is also called…?

A

Packet Sniffers

26
Q

What are protocol analyzers?

A

Software tool that allows for the capture, reassembly, and analysis of packets from the network

27
Q

What is Nmap?

A

A tool that can be used to determine what hosts are on your network, so in that respect it is a network mapping tool.

It can also be used to determine what services are running on what open ports and what versions of those services are being run. This makes Nmap a vulnerability scanner as well.

28
Q

What is password analysis?

A

A tool used to test the strength of your passwords to ensure your password policies are being followed

29
Q

What is password cracker?

A

Uses comparative analysis to break passwords and systematically continues guessing until the password is determined

30
Q

What are the two most well known password crackers?

A

Cain and Abel
John the Ripper

31
Q

What are the four different methods of doing password cracking and analysis?

A

Password Guessing
Dictionary Attack
Brute Force Attack
Cryptanalysis Attack

32
Q

What is password guessing?

A

Occurs when a weak password is simply figured out by a person

33
Q

What is a dictionary attack?

A

Method where a program attempts to guess the password by using a list of possible passwords

34
Q

What is a Brute-Force Attack?

A

Method where a program attempts to try every possible combination until it cracks the password

35
Q

What is a cryptanalysis password?

A

This attack relies on comparing a precomputed encrypted password to a value in a lookup table

36
Q

What is a rainbow table?

A

List of precomputed values used to more quickly break a password since values don’t have to be calculated for each password being guessed

*** This is what a cryptanalysis password refers to in order to work

37
Q

What is a yellow team?

A

The team responsible for building tools and architectures in which the exercise will be performed