Section 4.3 Flashcards

1
Q

What is the purpose of vulnerability scans?

A

Vulnerability scans are used to determine of a system is vulnerable to a type of attack. This process is minimally invasive. It might perform a port scan to figure out what ports are open that might be vulnerable to an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SAST?

A

Static Application Security Testing (SAST) is a software that reviews the source code of an application to determine where potential vulnerabilities might be. It checks for different security vulnerabilities such as buffer overflows, database injections, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is dynamic analysis (fuzzing)?

A

Fuzzing sends random input to an application to see what the results might be. Different types of fuzzing might be fault injecting, robustness testing, syntax testing, negative testing and more. The goal is to see how the application will react, will it crash, throw an error, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is OSINT?

A

Open Source Intelligence (OSINT) is information that is available to anyone. This information can be gathered from different cybersecurity forums, government data, commercial data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is CTA?

A

Cyber Threat Alliance (CTA) is a group of organizations that gather details about various threats, put it together in a standard format and distribute it to the rest of the alliance. The alliance validates the information and scores the severity of the threat. Everyone in the alliance will evaluate this information and determine how they will use it for their organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a pentest?

A

A penetration test is a simulated attack on our own system. Different from vulnerability scanning, pen testing performs exploits on the found vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the rules of engagement?

A

Rules of engagement is a formal list of rules that are written out so everyone understands the scope and purpose of this pen testing.
For example the type of testing is defined (physical breach, internal test, external test, etc), or schedule is defined (normal working hours, after 6pm, etc)
Details rules are provided such as what IP ranges to attack, emergency contacts, how to handle sensitive information, in and out of scope devices or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is CVSS?

A

Common Vulnerability Scoring System is a scoring system for vulnerabilities and puts them on a scale of 0 to 10. Different scoring standards are CVSS 2.0 or CVSS 3.x.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a CVE?

A

Common Vulnerabilities and Exposures (CVE) is a standardized identifier for a publicly known cybersecurity vulnerability or exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Exposure Factor?

A

An exposure factor is the risk level of having a specific vulnerability existing in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are environmental variables?

A

The type of environment that is associated with the vulnerability. For example where is the device that contains the vulnerability located, is it in a secure location, or a public location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Risk Tolerance?

A

Risk tolerance is the amount of risk an organization is willing to accept by having a vulnerability unpatched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly