4.3 Vulnerability Scanning Flashcards

(15 cards)

1
Q

What is the purpose of vulnerability scans?

A

To determine if a system may be susceptible to a type of attack

Vulnerability scans do not perform an attack; they check for potential vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a port scan?

A

A simple type of vulnerability scan that informs about open and closed ports on a system

Open ports can potentially be used by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: Every open port is susceptible to an attack.

A

False

Open ports do not automatically indicate vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do vulnerability scans help to find?

A

Systems that might be vulnerable before attackers do

Scans can identify systems within a specific IP subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a common misconception about vulnerability scan results?

A

Not everything found is always accurate

Reports may include false positives that need to be verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the severity levels typically found in vulnerability scan reports?

A

Critical, High, Medium, Low, Informational

Each level indicates the urgency of addressing the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a critical vulnerability related to OpenSSH or OpenSSL?

A

Weakness in the random number generator used for SSH host keys

Caused by a bug in the OpenSSL library.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does unsupported version detection indicate?

A

A system running an outdated Unix operating system that can no longer receive security updates

This might be a previously unknown system in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is static application security testing?

A

A method used by developers to review source code for potential vulnerabilities

It can identify issues like buffer overflows and database injections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: A static code analyzer does not understand how certain technologies may have been implemented in the code, such as _______.

A

authentication security

Insecure implementations of cryptography are also often missed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is dynamic analysis in application security?

A

A process that tests an application with random input to identify vulnerabilities

This is also known as fuzzing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What was one of the first fuzzers created?

A

The Fuzz Generator, developed in 1988 at the University of Wisconsin

It was part of a class project on Operating System Utility Program Reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Basic Fuzzing Framework (BFF)?

A

A fuzzing engine provided by the CERT

It can be downloaded and used to test applications for vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should you verify before installing a software package?

A

That the package can be trusted and is from the manufacturer directly

Third-party packages may contain malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is it important to test software packages in a lab environment?

A

To ensure the contents are safe before deploying them into production

This helps in understanding what vulnerabilities might be present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly