Section 22.216 Validating Vulnerability Remediation Flashcards

Objective 4.3 Explain various activities associated with vulnerability management

1
Q

Remediation

A

Involves installing patches, reconfiguring devices, or other actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rescanning Devices

A

Conduct post-remediation scans to double-check vulnerability mitigation

■ Identify any remaining unaddressed vulnerabilities

■ Detect new vulnerabilities that may have emerged since the initial scan

■ Validate whether applied patches effectively solved the identified vulnerabilities

Suggestions: Schedule automatic re-scans and maintain consistency with initial scan conditions.
● Use comprehensive scans
● Replicate initial scan conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Auditing Devices

Auditing

A

Involves systematic review of logs, configurations, and patches

● Ensures alignment with established security standards and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Auditing Devices

Configuration Auditing

A

Checks for misconfigurations or deviations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Auditing Devices

Patch Auditing

A

Confirms proper application and effectiveness of patches

■ Maintain detailed records of vulnerabilities, patches, and changes

■ Use automated auditing tools and include compliance checks for industry
regulations or standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Verification of Devices

Verification

A

Final step in validating remediation

● Involves testing systems to confirm patches and configuration changes

■ Conduct penetration tests to verify vulnerability remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User Verification

A

Ensures applications and services are functioning correctly

■ Establish feedback loops with users and staff to identify and address
post-remediation issues

Perform:
● Holistic testing
● Continuous monitoring
● Consider external auditors for verification

Verify both the resolution of vulnerabilities and overall system stability and functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly