What is a Vulnerability Assessment?
What are the Objectives of a Vulnerability Assessment?
What are the Types of Vulnerability Assessments?
What is a Host assessment?
Assessment of critical servers
What is Network and Wireless Assessment?
Assessment of network and network-accessible resource policies
What is Database Assessment?
Assessment of databases or big data systems and classifying sensitive data across infrastructure
What are the Five Key Steps in Vulnerability Management?
What is Vulnerability Management Policy?
What are the Phases of a Vulnerability Assessment Scanner?
Define Processes in the Security Scanning Process
What is Scoping in Security Scanning?
Define the scope of the assessment
What is Gathering Information in Security Scanning?
What is Vulnerability Identification in Security Scanning?
Analyzing the results of the vulnerability scans and identifying potential vulnerabilities that could be exploited
What is Risk Assessment in Security Scanning?
Prioritizing vulnerabilities
What is Vulnerability Analysis in Security Scanning?
Identify source and root cause of vulnerabilities identified
What are the Factors considered in Risk Assessment in Security Scanning?
What is Remediation in Security Scanning?
What is Validation in Security Scanning?
Performing a follow-up assessment to validate that vulnerabilites have been properly addressed
What is a Vulnerability Scoring System?
Used to quantify and prioritize vulnerabilities based on severity and potential impact
What is the CVSS?
The Common Vulnerability Scoring System is a standard that assigns a numerical score ranging from 0 to 10 based on several factors
What is the CVE?
The Common Vulnerabilities and Exposures system logs publicly known vulnerabilities and assigns a unique identifier to them
What is the Identifier format for the CVE?
CVE-Year-#####
What is the Format of a CVSS Vector String?
What are the Three CVSS Metric Groups?