Exam 15: Vulnerability Assessment and Third Party Integration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the following terms to the appropriate definitions. -A penetration test where some limited information has been provided to the tester.​

(Multiple Choice)
4.9/5
(34)

The comparison of the present state of a system to its baseline is known as what?

(Multiple Choice)
4.7/5
(36)

During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?

(Multiple Choice)
4.8/5
(37)

When a security hardware device fails or a program aborts, which state should it go into?

(Essay)
4.9/5
(30)

​A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as a:

(Multiple Choice)
4.8/5
(37)

Vulnerability scans are usually performed from outside the security perimeter.

(True/False)
4.9/5
(50)

____________________ for organizations are intended to identify vulnerabilities and alert network administrators to these problems. ​Matching a.​Architectural design b.Attack surface​ c.​Baseline reporting d.Code review​ e.​Gray box

(Short Answer)
4.9/5
(36)

What term below describes the start-up relationship between partners?​

(Multiple Choice)
4.8/5
(39)

Which item below is an imaginary line by which an element is measured or compared, and can be seen as the standard?

(Multiple Choice)
4.8/5
(33)

What is the name for the code that can be executed by unauthorized users within a software product?

(Multiple Choice)
4.9/5
(39)

Describe a penetration testing report.

(Essay)
4.8/5
(26)

The goal of what type of threat evaluation is to better understand who the attackers are, why they attack, and what types of attacks might occur?

(Multiple Choice)
4.9/5
(41)

List two types of hardening techniques.

(Essay)
4.7/5
(31)

Match the following terms to the appropriate definitions. -The start-up relationship agreement between parties.​

(Multiple Choice)
4.7/5
(38)

An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be in?

(Multiple Choice)
5.0/5
(36)

Match the following terms to the appropriate definitions. -The code that can be executed by unauthorized users in a software program​

(Multiple Choice)
4.8/5
(29)

A port in what state below implies that an application or service assigned to that port is listening for any instructions?

(Multiple Choice)
4.8/5
(42)

What security goal do the following common controls address: hashing, digital signatures, certificates, nonrepudiation tools?​

(Multiple Choice)
5.0/5
(32)

What is another term used for a security weakness?

(Multiple Choice)
4.8/5
(33)

In a __________ test, the tester has no prior knowledge of the network infrastructure that is being tested.

(Short Answer)
4.8/5
(37)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)