Vulnerability Analysis and Nessus Flashcards

1
Q

What are the 4 basic steps in the vulnerability management workflow?

A
  • Detection
  • Reporting
  • Remediation
  • Reassessment

prioritize the found vuls. based on their severities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of vulnerability scan accesses configuration information from the systems it is run against as well as information that can be accessed via services available via the network?

A

Authenticated scans use a read-only account to access configuration files, allowing more accurate testing of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What to do if vulnerability scanner continues to incorrectly flag the system as vulnerable after it was patched?

A
  • information security team needs to flag the issue as resolved
  • many vulnerability scanners rely on version or banner information and may flag patched versions if the software provider does not update the information they see
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When vulnerability scanner identifies a potential problem, what is necessary to do next?

A

validation, to verify that the issue exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When should be assets scanned?

A

routinely and after major changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What cybersecurity roles contain work that includes aspects of Vulnerability Management?

A
  • Threat Intelligence Analyst
    • receiving and reporting on intelligence about newly released vulnerabilities, or vulnerabilities that are actively being exploited in the wild
    • have access to commercial tools that allow them to observe exploitation activity on a global scale
  • Vulnerability Analyst
    • vulnerability scanning, analyzing results, performing manual checks, reporting on security flaws, and keeping up-to-date with the latest publicly available news regarding vulnerabilities
  • Incident Responder
    • knowledge about vulnerabilities, and how to deal with compromises as a result of successful exploitation is key in knowing how to respond
  • Penetration Tester / Red Teamer
    • knowing how to identify and scan for vulnerabilities and security flaws is key to this role so they can be exploited
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name examples of 3 most common vulnerability scanners

A
  • Nessus
  • OpenVAS
  • Nikto
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Nessus policy?

A
  • sets of configuration settings that define how a vulnerability scan is conducted
  • determine the scope, depth, and behavior of a vulnerability scan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Nessus policy templates?

A

predefined configurations provided by Nessus to simplify the process of setting up vulnerability scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you find in the My Scans section in Nessus?

A
  • any scans that have been conducted by the currently signed-in user
  • includes completed, scheduled, pending, and failed scans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you find in the All Scans section in Nessus?

A
  • any scans that have been conducted by any users within an organisation
  • includes completed, scheduled, pending, and failed scans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Nessus plugins?

A
  • small programs or scripts that perform specific tasks during a vulnerability scan
  • each plugin is designed to check a particular aspect of a target system, such as a software application, service, or configuration, for vulnerabilities, misconfigurations, or security issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Nessus scanners?

A
  • different hosts that are able to perform enumeration
  • useful if there are multiple V-LANs or physical networks that need to be scanned, and the hosts can’t communicate directly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which company created Nessus?

A

Tenable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly