Exam 4: Vulnerability Assessment and Mitigating Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

C

A ____ outlines the major security considerations for a system and becomes the starting point for solid security.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D

____ is the proportion of an asset's value that is likely to be destroyed by a particular risk.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

C

When a security hardware device fails or a program aborts, which state should it go into?

(Essay)
4.9/5
(41)

The ____ is the expected monetary loss every time a risk occurs.

(Multiple Choice)
4.8/5
(40)

A security weakness is known as a(n) ____.

(Multiple Choice)
5.0/5
(46)

Most vulnerability scanners maintain a(n) ____________________ that categorizes and describes the vulnerabilities that it can detect.

(Short Answer)
4.9/5
(38)

In an empty box test, the tester has no prior knowledge of the network infrastructure that is being tested.

(True/False)
4.9/5
(32)

Discuss one type of asset that an organization might have.

(Essay)
4.7/5
(34)

List and describe two common uses for a protocol analyzer.

(Essay)
4.9/5
(41)

____ is the probability that a risk will occur in a particular year.

(Multiple Choice)
4.8/5
(35)

When using a black box test, many testers use ____________________ tricks to learn about the network infrastructure from inside employees.

(Short Answer)
4.9/5
(39)

____ is a comparison of the present state of a system compared to its baseline.

(Multiple Choice)
4.8/5
(32)

List and describe the elements that make up a security posture.

(Essay)
4.8/5
(34)

Vulnerability scans are usually performed from outside the security perimeter.

(True/False)
4.7/5
(35)

The goal of ____ is to better understand who the attackers are, why they attack, and what types of attacks might occur.

(Multiple Choice)
4.8/5
(39)

List four things that a vulnerability scanner can do.

(Essay)
4.8/5
(34)

A healthy security posture results from a sound and workable strategy toward managing risks.

(True/False)
4.8/5
(29)

A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files.

(Multiple Choice)
4.8/5
(36)

A ____ in effect takes a snapshot of the current security of the organization.

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)