4.3 Analyzing Vulnerabilities Flashcards

(19 cards)

1
Q

What is a false positive in the context of vulnerability scanning?

A

A false positive occurs when a vulnerability is reported to exist but does not actually exist in the operating system.

False positives can lead to unnecessary concern or action by IT staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a false negative in vulnerability analysis?

A

A false negative means that a vulnerability exists but is not detected by the scanning software.

False negatives can be more dangerous as they leave systems exposed to exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should be done to minimize false positives during a vulnerability scan?

A

Update your scanning software’s signatures before performing the scan.

Keeping signatures updated helps ensure the scanner recognizes the latest vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are vulnerabilities typically categorized in reports?

A

Vulnerabilities are categorized by severity, including high, critical, low, or informational.

This categorization helps prioritize which vulnerabilities to address first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Common Vulnerability Scoring System (CVSS)?

A

CVSS is a scoring system that assigns a score between 0 and 10 to vulnerabilities, indicating their severity level.

A score of 10 represents the most critical vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where can one find publicly available vulnerability lists?

A

Vulnerability lists can be found at the National Vulnerability Database (nvd.nist.gov) and the Common Vulnerabilities and Exposures (CVE) database (cve.mitre.org).

These databases provide detailed information and scoring for known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an exposure factor?

A

An exposure factor is a percentage representing the likelihood that a vulnerability will be exploited, affecting the service’s availability.

For example, a 50% exposure factor means the service may be unavailable half the time due to the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What factors influence the prioritization of patching vulnerabilities?

A

Factors include the environment (public cloud vs. test lab), the number and type of users, the criticality of the application, and the ease of exploitation.

Different environments require different patching strategies based on risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is risk tolerance in vulnerability management?

A

Risk tolerance describes how much risk an organization is willing to accept by leaving a vulnerability unpatched.

Organizations must balance the risk of exploitation against the cost and impact of patching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: A vulnerability scanner can identify vulnerabilities in network devices.

A

True

Vulnerability scanners can analyze firewalls, switches, routers, and other network devices for vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the significance of understanding the environment where a vulnerability exists?

A

Understanding the environment helps determine the urgency and strategy for patching vulnerabilities.

Publicly accessible systems often require faster patching than isolated systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: The severity of vulnerabilities is often categorized as high, critical, low, or _______

A

informational

Informational vulnerabilities may not pose immediate threats but should still be tracked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is prioritization in the context of vulnerabilities?

A

Determining which device may be more important than another based on the risk of having a vulnerability exist on that device.

This process helps organizations focus on critical vulnerabilities first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does risk tolerance refer to?

A

How much risk an organization is willing to accept by having a particular vulnerability unpatched.

It varies based on the organization’s policies and threat landscape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why can’t patches be deployed immediately upon release?

A

Patches require testing to ensure they work properly in the organization’s environment.

This testing is crucial to avoid introducing new issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a significant risk during the testing process of a patch?

A

The organization remains vulnerable while testing is ongoing.

This highlights the need for a balance between testing and security.

17
Q

What does it mean to have a low tolerance for vulnerability?

A

A situation where an organization may want to rush through the testing process to patch systems quickly due to high risk.

This often occurs when a vulnerability affects many systems and is easy to exploit.

18
Q

What is the balance organizations need to find regarding patch testing?

A

Performing as much testing as possible while ensuring organizational security.

This balance helps minimize risk while maintaining operational integrity.

19
Q

Fill in the blank: The process of determining which device may be more important than another is referred to as _______.

A

prioritization