Vulnerability Assessment Flashcards
What does the ‘Remediation’ stage of Vulnerability Assessment entail?
Remediation is the process of applying fixes on vulnerable systems in order to reduce the impact and severity of vulnerabilities
What does the ‘Verification’ stage of Vulnerability Assessment entail?
This phase provides clear visibility into the firm and allows the security team to check whether all the previous phases have been perfectly employed or not
What does the ‘Risk Assessment’ stage of Vulnerability Assessment entail?
All serious uncertainties that are associated with the system are assessed and prioritized, and remediation is planned to permanently eliminate system flaws
What does the ‘Monitoring’ stage of Vulnerability Assessment entail?
Organizations need to performed regular monitoring to maintain system security. Continuous monitoring identifies potential threats and any new vulnerabilities that have evolved
What is CVSS?
CVSS (the Common Vulnerability Scoring System) is a published standard that provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.
What is the correct order of steps in vulnerability assessment?
- Risk Assessment
- Remediation
- Verification
- Monitoring
What is the correct order of steps in the vulnerability management lifecycle?
- Identify Assets & Create Baseline
- Vulnerability Scan
- Risk Assessment
- Remediation
- Verification
- Monitor
- Repeat
What are the 3 metrics which establish a CVSS score?
Base Metrics, Environmental Metrics, and Temporal Metrics.
What is an Internal Assessment?
An internal assessment involves scrutinizing the internal network to find exploits and vulnerabilities
What is a Distributed Assessment?
This type of assessment, employed by organizations that possess assets like servers and clients at different locations, involves simultaneously assessing the distributed organization assets, such as client and server applications, using appropriate synchronization techniques
What is a Network-based Assessment?
These assessments discover network resources and map the ports and services running to various areas on the network
What is a Credentialed Assessment?
In this type of assessment, the ethical hacker possesses the credentials of all machines present in the assessed network
What is a host-based assessment?
A host-based assessment involves looks at the vulnerabilities of the devices on a particular network
What is an active assessment?
An active assessment involves using a network scanner to look for hosts
What is a passive assessment?
A passive assessment involves sniffing packets in a network