Exam 15: Vulnerability Assessment and Third Party Integration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A port scanner can be used to search a system for port vulnerabilities. The RADMIN port scanner is an example of this type of software.

Free
(True/False)
4.8/5
(40)
Correct Answer:
Verified

True

A(n) ____________________ box test is one in which some limited information has been provided to the tester.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

gray

Describe the purpose of a honeypot.

Free
(Essay)
4.8/5
(28)
Correct Answer:
Verified

A honeypot can also direct an attacker's attention away from legitimate servers. A honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention from the data on the real server.

Match the following terms to the appropriate definitions. -​In software development, the process of defining a collection of hardware and software components along with their interfaces in order to create the framework for software development.

(Multiple Choice)
4.8/5
(34)

An administrator needs to view packets and decode and analyze their contents. What type of application should the administrator use?

(Multiple Choice)
4.8/5
(33)

List four things that a vulnerability scanner can do.

(Essay)
4.9/5
(39)

​What term below describes a prearranged purchase or sale agreement between a government agency and a business?

(Multiple Choice)
4.8/5
(26)

A healthy security posture results from a sound and workable strategy toward managing risks.

(True/False)
4.8/5
(34)

When using a black box test, many testers use ____________________ tricks to learn about the network infrastructure from inside employees.

(Short Answer)
4.8/5
(33)

If TCP port 20 is open, then an attacker can assume that FTP is being used.

(True/False)
5.0/5
(34)

Discuss one type of asset that an organization might have.

(Essay)
4.8/5
(38)

Match the following terms to the appropriate definitions. -In software development, presenting the code to multiple reviewers in order to reach agreement about its security.​

(Multiple Choice)
4.8/5
(38)

List and describe the three categories that TCP/IP divides port numbers into.

(Essay)
4.8/5
(40)

Match the following terms to the appropriate definitions. -​A computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, but are actually imitations of real data files, to trick attackers into revealing their attack techniques.

(Multiple Choice)
4.8/5
(36)

What is the end result of a penetration test?

(Multiple Choice)
4.8/5
(37)

Most vulnerability scanners maintain a(n) ____________________ that categorizes and describes the vulnerabilities that it can detect.

(Short Answer)
4.9/5
(41)

Match the following terms to the appropriate definitions. -A comparison of the present state of a system to its baseline.​

(Multiple Choice)
4.8/5
(38)

The first step in a vulnerability assessment is to determine the assets that need to be protected.

(True/False)
4.8/5
(34)

What is the name of the process that takes a snapshot of the current security of an organization?

(Multiple Choice)
4.9/5
(38)

Discuss the purpose of OVAL.

(Essay)
4.8/5
(43)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)