Penetration Testing & Analyzing Vulnerabilities Flashcards

(14 cards)

1
Q

Penetration Testing

A

Penetration testing → security assessment where testers actively attempt to exploit vulnerabilities to determine real-world impact, going beyond vulnerability scanning by proving whether weaknesses can actually be abused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rules of Engagement

A

Rules of engagement → formal agreement that defines the scope, timing, methods, permissions, and limitations of a penetration test to ensure testing is legal, controlled, and aligned with business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploiting Vulnerabilities

A

Exploiting vulnerabilities → phase of penetration testing where multiple attack techniques such as password brute force, social engineering, database injection, or buffer overflows are attempted to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Process

A

The process → penetration testing workflow that involves initial access, lateral movement between systems, establishing persistence through backdoors, and accessing normally restricted systems to fully evaluate security weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Responsible Disclosure Program

A

Responsible disclosure program → structured process that allows researchers to report vulnerabilities safely so organizations can fix issues before details are publicly released.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

False Positives

A

False positives → vulnerability scan results that incorrectly report a weakness that does not actually exist, often requiring manual validation to dismiss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

False Negatives

A

False negatives → vulnerabilities that exist but are missed by scans or tests, creating a dangerous false sense of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

High-Severity Vulnerabilities

A

High-severity vulnerabilities → weaknesses that are easy to exploit and cause major impact such as system compromise, data breaches, or service disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Medium-Severity Vulnerabilities

A

Medium-severity vulnerabilities → weaknesses that require specific conditions or user interaction to exploit and cause moderate impact if abused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Low-Severity Vulnerabilities

A

Low-severity vulnerabilities → weaknesses with limited impact or difficult exploitation that still contribute to overall risk when combined with other issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CVSS

A

Common vulnerability scoring system (CVSS) → standardized scoring model used to rate vulnerability severity based on exploitability, impact, and environmental factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CVE

A

Common vulnerabilities and exposures (CVE) → publicly maintained catalog that assigns unique identifiers to known vulnerabilities for consistent tracking and reference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Exposure Factor

A

Exposure factor → measure of potential damage from a single security event, representing the percentage of asset value that could be lost during an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Tolerance

A

Risk tolerance → level of risk an organization is willing to accept based on business priorities, cost, and operational impact, influencing how vulnerabilities are addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly