Vulnerability Management Flashcards

(20 cards)

1
Q

Systematic practice of spotting and categorizing weakness in a system, network, or application that could potentially be exploited.

A

Identifying Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Automated method of probing networks, system, and applications to disaster potential vulnerabilities

A

Vulnerability Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Used to safeguard the software from being manipulated during it’s lifecycle.

A

Application Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to analyze an application’s source code without executing it.

A

Static Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Evaluates an application as it is being run to determine if there are any vulnerabilities in the application.

A

Dynamic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensures that the libraries and components that the application depends on are secure and up-to-date.

A

Package Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Continual process used to understand the threats faced by an organization

A

Threat Intelligent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Continuous stream of data related to potential or current threats to an organization’s security

A

Threat Intel Feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intel that is collected from publicly available sources including reports, forums, news articles, blogs, and social media posts.

A

OSINT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat intel feeds that are provided by commercial vendors, usually under a subcription service tyoe of business model

A

Proprietary or Third-party Feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Term used to describe the ethical practice where a security researcher discloses information about vulnerabilities in a software, hardware, or online services

A

Responsible Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System that provides a standardized way to uniquely identify and reference known vulnerabilities in software and hardware.

A

CVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Used as quantifiable metric to help a cybersecurity professional understand the exact % of an asset that is likely to be damaged or affected if a particular vulnerability is exploited

A

EF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Strategies that identify, access, and address vulnerabilities in a system or network to strengthen an organization’s security posture.

A

Vulnerability Response and Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Apply software updates to fix security vulnerabilities

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Procuring insurance policies to mitigate financial losses from cyber incidents

A

Purchasing Cybersecurity Insurance Policies

17
Q

Dividing a network into smaller segments for improves security and performance.

A

Network Segmentation

18
Q

Temporarily relaxes security controls for operational business needs.

19
Q

Permanently waives controls for specific reasons such as when using a legacy system

20
Q

Process of documenting and communicating details about security weaknesses identified in software or systems to the individuals or organizations responsible for addressing the issue

A

Vulnerability Reporting