Vulnerability Mgmt Flashcards

(20 cards)

1
Q

What is the goal of asset discovery in vulnerability management?

A

To identify systems and services that must be assessed and tracked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When is an internal vulnerability scan used?

A

When assessing assets from inside the organizations network boundary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When is an external vulnerability scan used?

A

When assessing the attack surface visible from outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between agent-based and agentless scanning?

A

Agent-based uses software on the host; agentless probes remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a credentialed scan?

A

A scan that logs into the target to inspect configuration and patch state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why can non-credentialed scans miss important findings?

A

They only see what is exposed externally and cannot inspect internal settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between passive and active vulnerability scanning?

A

Passive observes traffic without touching hosts; active sends probes to hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is static application security testing (SAST)?

A

Testing source code or binaries without running the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is dynamic application security testing (DAST)?

A

Testing a running application from the outside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Nmap mainly used for during assessment?

A

To identify hosts, ports, services, and some service details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do Nessus or OpenVAS primarily provide?

A

Automated vulnerability scanning and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Burp Suite and OWASP ZAP commonly used for?

A

Web application security testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the CVSS base score estimate?

A

The inherent severity of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is CVSS alone not enough for prioritization?

A

Because exploitability, asset value, exposure, and business impact also matter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a false positive in vulnerability management?

A

A reported issue that is not actually exploitable or present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between a vulnerability and an exploit?

A

A vulnerability is a weakness; an exploit is a method of abusing it.

17
Q

What is a compensating control?

A

An alternate safeguard used when the primary fix cannot be applied immediately.

18
Q

Why are maintenance windows important for patching?

A

They reduce operational disruption while changes are applied and tested.

19
Q

What is the purpose of threat modeling?

A

To identify likely attack paths and design controls before deployment.

20
Q

What is secure SDLC intended to achieve?

A

To build security activities into every phase of software development.