Vulnerability Scanning for Security Misconfiguration Flashcards

1
Q

Why is it important to perform a vulnerability scan after the process of using the API/reverse engineering?

A

Because doing a scan could set off a security control to block the connection, preventing the attacker to perform any other tests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The most common outcome for a vulnerability scan is the false-negative. How could this affect a company?

A

It can result in a false sense of security, because the vulnerabilities that are present were not reported by the scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is a vulnerability scanner good to find security misconfigurations? What can a security misconfiguration include?

A

Yes, it is a good tool for that purpose. It can include missing system patch, unprotected files, weak security headers, lack of transit encryption, CORS policy misconfiguration, verbose error messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly