Security Threats and Vulnerabilities Flashcards
1
Q
Passive tools
A
No interaction
Gather information external to the device
Packet captures
2
Q
Active tools
A
The device can see you looking
Vulnerability scanners, honeypots, port scanners,
banner grabbing
3
Q
Port scanners
A
Identify open ports on a system
Identify firewalls and packet filters
Identify operating systems and services
Based on simple packet requests and responses
4
Q
Banner Grabbing
A
The banner is always there
Capture it with telnet or an automated tool
5
Q
Assessment Techniques
A
Baseline Reporting
Determine risk
Determine which metrics and resources to monitor
Changes might indicate security concern