Vulnerability management Flashcards

(33 cards)

1
Q

__ is a continuous process of identifying, evaluating, treating, and
reporting security weaknesses in systems and networks to reduce risk

A

VUlnerability management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

stages of vulnerability management

A

Scan»_space; Patch»_space; Pentest»_space; report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The automated process of identifying vulnerabilities in systems using specialized tools.

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Detects outdated software, open port, weak configurations

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can be shceduled: daily, weekly, or monthly

A

scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Produces detailed reports listing discovered vulnerabilities

A

scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EXAMPLES OF SCANNING

detects missing security patches & updates

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EXAMPLES OF SCANNING

scans networks for known risks

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EXAMPLES OF SCANNING

identifies open ports and running services

A

Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of updating systems or software to fix known vulnerabilities discovered during scanning.

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EXAMPLES OF PATCHING

windows/linux security patches

A

OS updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EXAMPLES OF PATCHING

fixing web server CVEs

A

Apache HTTP Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EXAMPLES OF PATCHING

applying security updates to apps

A

Mobile apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

fixes security holes discovered during scanning

A

patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

requires testing before deployment in live environments

A

patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

must be done regularly to maintain a secure posture

17
Q

The controlled simulation of cyberattacks to determine if vulnerabilities can be exploited — conducted
ethically with permission.

A

basic penetration testing

18
Q

goes beyond scanning, actively exploits weaknesses

19
Q

always conducted ethically and with written permission

20
Q

helps understand real-world impact of vulnerabilities

21
Q

EXAMPLES OF PENTEST

exploit known vulnerabilities in targets

22
Q

EXAMPLES OF PENTEST

attempt unauthorized system access

23
Q

EXAMPLES OF PENTEST

test misconfigured services and auth

A

Weak passwords

24
Q

Documenting vulnerabilities, their severity, and recommended fixes to communicate findings to
management or IT teams.

25
communicates findings to management and IT teams
Reporting
26
includes risk levels: low, medium, high, and critical
Reporting
27
suggests concrete mitigation strategies for each finding
Reporting
28
SECURITY LEVEL outdated server with public exploit
Critical
29
SECURITY LEVEL unpatched RCE in web application
High
30
SECURITY LEVELS Weak password policy enforced
Medium
31
SECURITY LEVELS verbose error messages exposed
Low
32
CONCEPT FLOW - VM CYCLE
Scan >> analyze >> patch >> pentext >> report
33
This is a CONTINUOUS cycle — after reporting, the process starts again with a new scan.
Vulnerability management