Deck 5: Scanning for Vulnerabilities
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 5: Scanning for Vulnerabilities
1
A vulnerability scan is a single event using a manual process that is too often performed only to comply with regulatory requirements.
False
2
Which of the following describes a collection of requirements specific to a system or procedure that must be met by everyone?
A) Policy
B) Standard
C) Framework
D) Guideline
A) Policy
B) Standard
C) Framework
D) Guideline
B
3
Which of the following describes a vulnerability scan?
A) It identifies deep vulnerabilities.
B) It uses external third parties to conduct the scan.
C) It uses a primarily automated process.
D) It aims to gain unauthorized access.
A) It identifies deep vulnerabilities.
B) It uses external third parties to conduct the scan.
C) It uses a primarily automated process.
D) It aims to gain unauthorized access.
C
4
An organization's tolerance for exposure to a vulnerability is called its _____________.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
Name a product that is a well-known vulnerability scanner.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a full-featured vulnerability scanner that includes over 50,000 vulnerability tests?
A) Metasploit
B) Scantron
C) OpenVAS
D) GNU GPL
A) Metasploit
B) Scantron
C) OpenVAS
D) GNU GPL
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
What are module updates that can be downloaded and installed as needed?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not a vulnerability feed?
A) Department of Defense Database of Vulnerabilities (DoD-DV)
B) NIST National Vulnerability Database (NVD)
C) Mitre Common Vulnerabilities and Exposures (CVE)
D) VulnDB
A) Department of Defense Database of Vulnerabilities (DoD-DV)
B) NIST National Vulnerability Database (NVD)
C) Mitre Common Vulnerabilities and Exposures (CVE)
D) VulnDB
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
When you are actively seeking information on the Internet, such as an answer to a question, are you using a "pull" method or a "push" method?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following demonstrates a "convergence of will" between the parties so that they can work together, but is not generally considered a legally enforceable agreement?
A) Service level agreement
B) Memorandum of understanding
C) Interconnection security agreement
D) Non-disclosure agreement (NDA)
A) Service level agreement
B) Memorandum of understanding
C) Interconnection security agreement
D) Non-disclosure agreement (NDA)
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck