Vulnerability Analysis Flashcards

1
Q

What does the term vulnerability assessment mean?

A

Vulnerability assessment plays a major role in providing security to any organizations resources and infrastructure from various interanl and exteral threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different vulnerability scoring systme and databases?

A

Base
Threat
Environmental
Supplemental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Base Metric CVSS tell you?

A

Represents the intrinsic characteristics of a vulnerability that are constant over time and across user enviornments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Threat Metric CVSS tell you?

A

Reflects the characteristics of a vulnerability that are relevant and unique to a particular consumers environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Environmental Metric CVSS tell you?

A

REpresents the characteristics of a vulnerability that are relevant and unique to a particular consumers environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Supplemental Metric CVSS tel you?

A

Includes metrics that provide context as well as describe and measure additional extrinsic attributes of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 6 vulnerability assessment tools?

A

Host-Based Vulnerability assessment tools
Depth assessment tools
Application Layer vulnerability assessment tools
Scope assessment tools
Active and passive tools
Location and Data examination tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Host-Based Vulnerablility assessment tools features?

A

These host-based scanners can detect high levels of vulnerabilities and probide required infromation about the fixes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Depth assessment tools features?

A

Depth assessment tools are used to discover and identify previously unknown vulnerabilities ina system. Tools such as fuzzers which provide arbitrary input to a systems interface are used to identify vulnerabilites to an unstable depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are application-layer vulnerability assessment tools features.

A

OBserving system vulnerabilities through the internet using an exterior router, firewall or webserver. These vulnerabilities could be externals DDOS threats, network data interception or other issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Scope assessment tools features?

A

They provide standatd controls and a reporting interface that allows the user to select a suitable scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the Active and passive tools features?

A

Active scanners perform vulnerability checks on the network functions. The administrator has control over the timing and the parameters of the scans.
Passive scanners only ovserve system data and perform data processing on a separate analysis machine. Does not use lots of resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Location and Data examination tools Features?

A

Network based scaners
Agent-based scanner
proxy scanner
cluster scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the key points for a vulnerability assessment report?

A

Vulnerability name
Mapped CVE ID
Date of discovery
The CVE score
Detailed description of the vulnerability
Impact of the vulnerability
Details regarding the affected systems
Details regarding the process needed to correct the vulnerability, including information patches, onfiguration fixes and ports to be blocked
A proof of concept of the bulnerability for the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability classifcation:

A

Misconfigurations/Weak configurations:
Network Misconfigurations:
Insecure Protocols, Open ports and services, erros, weak encryption.
Host Misconfirguations:
Open permissions, unsecured root accounts
Aplication Flaws:
Buffer over flows
Memory Leaks
Resource Exhaustion
Integer Overflows
Null Pointer/Object Dereference
DLL Injection
Race Conditions:
Time of Check/Time of Use
Improper Input Handling
Improper Error Handling
Code Signing Weakness
Poor patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly