What is the OWASP risk formula?
A. Risk = Threat + Impact
B. Risk = Likelihood × Impact
C. Risk = Vulnerability × Threat
D. Risk = Impact – Likelihood
Answer: B
Explanation:
OWASP defines risk as the combination of likelihood and impact. Likelihood measures how likely an attack is to occur, while impact measures the damage it would cause. Both must be considered to determine overall risk severity.
What is vulnerability management?
A. Scanning only
B. Full process including remediation
C. Detecting malware
D. Blocking traffic
Answer: B
Explanation:
Vulnerability management is a continuous process that includes identifying vulnerabilities, assessing risk, applying patches, and monitoring systems. Scanning is only one part of this process, not the entire lifecycle.
What is a vulnerability?
A. Threat
B. Weakness
C. Attack
D. Policy
Answer: B
Explanation:
A vulnerability is a weakness in systems, controls, or processes that can be exploited by a threat. It may exist in software, hardware, or organisational procedures
Why are many breaches successful?
A. Strong security
B. Unpatched vulnerabilities
C. Encryption
D. Logging
Answer: B
Explanation:
Many attacks exploit known vulnerabilities that have not been patched. Studies show most breaches could be prevented with proper vulnerability management.
Risk formula?
A. Threat
B. Likelihood × Impact
C. Logs
D. Detection
Answer: B
Explanation:
Risk is calculated by combining likelihood (probability of exploitation) and impact (damage caused). Both must be considered to assess severity.
Likelihood refers to:
A. Damage
B. Probability of attack
C. Logs
D. Detection
Answer: B
Impact refers to:
A. Probability
B. Damage caused
C. Logs
D. Detection
Answer: B
Threat agent factor example?
A. Skill level
B. Logs
C. Encryption
D. Backup
Answer: A
Explanation:
Threat agent factors include attacker skill level, motivation, opportunity, and size. These determine how likely a vulnerability is to be exploited.
Vulnerability factor example?
A. Ease of exploit
B. Logs
C. Encryption
D. Backup
Answer: A
Technical impact includes:
A. Financial loss
B. Loss of integrity
C. Reputation
D. Compliance
Answer: B
Business impact includes:
A. Integrity
B. Financial damage
C. Logs
D. Detection
Answer: B
What is CVE?
A. Score system
B. Vulnerability identifier
C. Firewall
D. IDS
Answer: B
Explanation:
CVE (Common Vulnerabilities and Exposures) assigns unique identifiers to vulnerabilities. This allows consistent tracking and referencing across systems.
What is CVSS?
A. ID
B. Severity scoring system
C. Firewall
D. IDS
Answer: B
What is CPE?
A. Device classification
B. Score
C. Log
D. Detection
Answer: A
What is CCE?
A. Config issue identifier
B. Score
C. Log
D. Detection
Answer: A
Heat map shows:
A. Logs
B. Likelihood vs impact
C. Encryption
D. Detection
Answer: B
Vulnerability management includes:
A. Scanning only
B. Full lifecycle (scan, assess, fix)
C. Detection only
D. Encryption
Answer: B