Vulnerability Management Flashcards

1
Q

Seeks to identify any issues in a network, application, database, or other
systems prior to it being used that might compromise the system

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Practice of finding and mitigating the vulnerabilities in computers and
networks

A

Vulnerability Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs when an attacker moves onto another workstation or user
account

A

Pivot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ability of an attacker to maintain a foothold inside the compromised
network

A

Persistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exercise that uses an incident scenario against a framework of controls or
a red team

A

Tabletop Exercise (TTX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A test that uses active tools and security utilities to evaluate security by
simulating an attack on a system to verify that a threat exists, actively
test it, bypass security controls, and then finally exploit vulnerabilities on
a given system

A

Penetration Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The hostile or attacking team in a penetration test or incident
response exercise

A

Red Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The defensive team in a penetration test or incident response
exercise

A

BLue Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Staff administering, evaluating, and supervising a penetration test
or incident response exercise

A

White team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A standard designed to regulate the transfer of secure public information
across networks and the Internet utilizing any security tools and services
available

A

Open Vulnerability and Assessment Language (OVAL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An XML schema used to define and describe the information being
created by OVAL to be shared among the various programs and tools

A

OVAL Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A reference developed to ensure the information passed around by these
programs complies with the OVAL schemas and definitions used by the
OVAL language

A

OVAL Interpreter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Baselining of the network to assess the current security state of
computers, servers, network devices, and the entire network in general

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Discovery and documentation of physical and logical connectivity
that exists in the network

A

Network Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technique that identifies threats on the network without
exploiting them

A

Vulnerability Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technique used to gain information about servers and
inventory the systems or services

A

Banner Grabbing

17
Q

The process of finding and investigating other computers on the
network by analyzing the network traffic or capturing the packets
being sent

A

Network Sniffing

18
Q

A tool used to test the strength of your passwords to ensure your
password policies
are being followed

A

Password Analysis

19
Q

Uses comparative analysis
to break passwords and systematically continues guessing
until the password
is determined
o Cain & Abel and John the Ripper

A

Password Cracker

20
Q

Occurs when a weak password is simply figured out by a
person

A

Password Guessing

21
Q

Method where a program attempts to guess the
password by using a list of possible passwords

A

Dictionary Attack

22
Q

Method where a program attempts to try every possible
combination until it
cracks the password

A

Brute-Force Attack

23
Q

Comparing a precomputed encrypted password to a value
in a lookup table

A

Cryptanalysis Attack

24
Q

List of precomputed valued used to more quickly break a
password since values don’t have to be calculated for each
password being guessed

A

Rainbow Table

25
Q

Attempt to crack a password by threatening or causing a
person physical harm in order to make them tell you the
password

A

Rubber Hose Attack