Section 25.239 Vulnerability Scans Flashcards

Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation

1
Q

Vulnerability Scans

Vulnerability Scan Report

A

Generated automatically after completing a vulnerability scan

■ Analysis of the report is essential to confirm the validity of identified vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

False Positives

A

Vulnerability scanners may produce false positives, meaning they report vulnerabilities that don’t actually exist on your system

■ It is crucial to differentiate real vulnerabilities from false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Analysis of Vulnerabilities

A

For each identified vulnerability, assess whether it was detected by the scanner and if it exists on your system

■ Determine the severity and criticality of each vulnerability

■ Create a plan of action and milestones for remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of a Vulnerability Scan Report

A

■ Report ID
■ Scan Date and Time
■ System or Software Version
■ Scan Initiator: The person who ran the scan
■ Executive Summary: Highlights themes and trends for large networks
■ Vulnerabilities – listed by severity (critical, high, medium, low, informational) or by vulnerable hosts
■ Additional Findings
■ Recommendations
■ Conclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CVE ID (Common Vulnerability and Exposure)

A

○ CVE website (cve.org) contains detailed information about vulnerabilities

● Description
● Affected system
● Impact
● Common Vulnerability Scoring System (CVSS) Score
○ Measures severity
● Remediation Recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly