Deck 5: Scanning for Vulnerabilities

Full screen (f)
exit full mode
Question
A vulnerability scan is a single event using a manual process that is too often performed only to comply with regulatory requirements.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following describes a collection of requirements specific to a system or procedure that must be met by everyone?

A) Policy
B) Standard
C) Framework
D) Guideline
Question
Which of the following describes a vulnerability scan?

A) It identifies deep vulnerabilities.
B) It uses external third parties to conduct the scan.
C) It uses a primarily automated process.
D) It aims to gain unauthorized access.
Question
An organization's tolerance for exposure to a vulnerability is called its _____________.
Question
Name a product that is a well-known vulnerability scanner.
Question
Which of the following is a full-featured vulnerability scanner that includes over 50,000 vulnerability tests?

A) Metasploit
B) Scantron
C) OpenVAS
D) GNU GPL
Question
What are module updates that can be downloaded and installed as needed?
Question
Which of the following is not a vulnerability feed?

A) Department of Defense Database of Vulnerabilities (DoD-DV)
B) NIST National Vulnerability Database (NVD)
C) Mitre Common Vulnerabilities and Exposures (CVE)
D) VulnDB
Question
When you are actively seeking information on the Internet, such as an answer to a question, are you using a "pull" method or a "push" method?
Question
Which of the following demonstrates a "convergence of will" between the parties so that they can work together, but is not generally considered a legally enforceable agreement?

A) Service level agreement
B) Memorandum of understanding
C) Interconnection security agreement
D) Non-disclosure agreement (NDA)
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Scanning for Vulnerabilities
1
A vulnerability scan is a single event using a manual process that is too often performed only to comply with regulatory requirements.
False
2
Which of the following describes a collection of requirements specific to a system or procedure that must be met by everyone?

A) Policy
B) Standard
C) Framework
D) Guideline
B
3
Which of the following describes a vulnerability scan?

A) It identifies deep vulnerabilities.
B) It uses external third parties to conduct the scan.
C) It uses a primarily automated process.
D) It aims to gain unauthorized access.
C
4
An organization's tolerance for exposure to a vulnerability is called its _____________.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
Name a product that is a well-known vulnerability scanner.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a full-featured vulnerability scanner that includes over 50,000 vulnerability tests?

A) Metasploit
B) Scantron
C) OpenVAS
D) GNU GPL
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
What are module updates that can be downloaded and installed as needed?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not a vulnerability feed?

A) Department of Defense Database of Vulnerabilities (DoD-DV)
B) NIST National Vulnerability Database (NVD)
C) Mitre Common Vulnerabilities and Exposures (CVE)
D) VulnDB
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
When you are actively seeking information on the Internet, such as an answer to a question, are you using a "pull" method or a "push" method?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following demonstrates a "convergence of will" between the parties so that they can work together, but is not generally considered a legally enforceable agreement?

A) Service level agreement
B) Memorandum of understanding
C) Interconnection security agreement
D) Non-disclosure agreement (NDA)
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.