Exam 4: Vulnerability Assessment and Mitigating Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List and describe the three categories that TCP/IP divides port numbers into.

(Essay)
4.8/5
(33)

List two types of hardening techniques.

(Essay)
4.9/5
(37)

A ____ is a network set up with intentional vulnerabilities.

(Multiple Choice)
5.0/5
(36)

While the code for a program is being written, it is being analyzed by a ____.

(Multiple Choice)
4.9/5
(28)

A(n) ____ means that the application or service assigned to that port is listening for any instructions.

(Multiple Choice)
4.8/5
(27)

Describe the purpose of a honeypot.

(Essay)
4.8/5
(41)

A(n) ____ is hardware or software that captures packets to decode and analyze its contents.

(Multiple Choice)
4.8/5
(35)

____________________ for organizations are intended to identify vulnerabilities and alert network administrators to these problems.

(Short Answer)
4.8/5
(45)

A ____ tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications.

(Multiple Choice)
4.8/5
(39)

Describe a penetration testing report.

(Essay)
4.9/5
(29)

____ is a means by which an organization can transfer the risk to a third party who can demonstrate a higher capability at managing or reducing risks.

(Multiple Choice)
4.9/5
(36)

The end product of a penetration test is the penetration ____.

(Multiple Choice)
4.8/5
(31)
Match each term with the correct statement below.
An automated software search through a system for any known security weaknesses
Asset identification
Identify what damages could result from the threats
Vulnerability scan
Designed to actually exploit any weaknesses in systems that are vulnerable
Vulnerability assessment
Correct Answer:
Verified
Premises:
Responses:
An automated software search through a system for any known security weaknesses
Asset identification
Identify what damages could result from the threats
Vulnerability scan
Designed to actually exploit any weaknesses in systems that are vulnerable
Vulnerability assessment
Identify what needs to be protected
Vulnerability appraisal
Eliminating as many security risks as possible and make the system more secure
Threat evaluation
Identify what to do about threats
Risk assessment
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Risk mitigation
Identifying what the pressures are against a company
Hardening
Identifying how susceptible the current protection is
Penetration testing
(Matching)
4.9/5
(35)

A(n) ____________________ scan uses various techniques to avoid detection.

(Short Answer)
4.9/5
(31)

A(n) ____ examines the current security in a passive method.

(Multiple Choice)
4.9/5
(38)

A(n) ____ indicates that no process is listening at this port.

(Multiple Choice)
4.8/5
(33)

The ____ for software is the code that can be executed by unauthorized users.

(Multiple Choice)
4.9/5
(32)

The first step in a vulnerability assessment is to determine the assets that need to be protected.

(True/False)
4.8/5
(33)

A(n) ____________________ box test is one in which some limited information has been provided to the tester.

(Short Answer)
4.9/5
(30)

Discuss the purpose of OVAL.

(Essay)
4.8/5
(31)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)