Vulnerability Scanning Flashcards

1
Q

Important to identify vulnerabilities so that they can be mitigated

A

Identifying Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An evaluation of a system’s security and ability to meet compliance requirements
based on the configuration state of the system as represented by information
collected from the system

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A hardware appliance or software application that is configured with a list of
known weaknesses and exploits and can scan for their presence in a host
operating system or within a particular application

A

Vulnerability Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The range of hosts or subnets included within a single scan job

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability scans being conducted on your local network
from within your local network

A

Internal Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability scans being conducted against your network from
outside of your local network

A

External Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An enumeration or vulnerability scan that analyzes only intercepted network
traffic rather than sending probes to a target

A

Passive Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An enumeration or vulnerability scan that analyzes the responses from probes
sent to a target

A

Active Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The vulnerability scanner is given a user accounts to log-on to the target systems
or hosts

A

Credentialed Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The vulnerability scanner sends test packets against a target without logging onto
the system or host

A

Non-credentialed Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The vulnerability scanning is launched from one or more scanning servers against
the targets

A

Server-based Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The vulnerability scanning is conducted using a software application installed
locally on each target

A

Agent-based Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerability scanners must be configured with parameters to be effective in scanning
your network

A

Scanning Parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The division of a network into separate zones through the use of VLANs and
subnetting

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A synchronized list of data and scripts used to check for vulnerabilities, also
known as plug-ins or network vulnerability tests (NVTs)

A

Vulnerability Feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A NIST framework that outlines various accepted practices for automating
vulnerability scanning by adhering to standards for scanning processes, results
reporting and scoring, and vulnerability prioritization

A

Security Content Automation Protocol (SCAP)

17
Q

An XML schema for describing system security state and querying vulnerability
reports and information

A

Open Vulnerability and Assessment Language (OVAL)

18
Q

An XML schema for developing and auditing best-practice configuration checklists
and rules

A

Extensible Configuration Checklist Description Format (XCCDF)

19
Q

The amount and intensity of vulnerabilities to test against a target

A

Scan Sensitivity

20
Q

Used to create and update an inventory of assets by conducting enumeration of
the network and its targets without scanning for vulnerabilities

A

Discovery Scan

21
Q

A scan that contains options for analyzing hosts for unpatched software
vulnerabilities and configuration issues

A

Fast/Basic Assessment Scan

22
Q

A comprehensive scan that forces the use of more plug-in types, takes longer for
to conduct host scanning, and has more risk of causing a service disruption

A

Full/Deep Assessment Scan

23
Q

A scan based on a compliance template or checklist to ensure the controls and
configuration settings are properly applied to a given target or host

A

Compliance Scans

24
Q

Printers, VoIP phones, and embedded systems components can react unpredictably to any type of scanning

A

Scanning Risks