Vulnerability & Penetration Testing Flashcards

Day9_Vulnerability Context Considerations & Communication Concepts (42 cards)

1
Q

What are vulnerabilities?

A

Vulnerabilities are weaknesses in IT systems (software, hardware, networks, or processes) that attackers can exploit to gain unauthorized access, disrupt services, or steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some methods to identify vulnerabilities?

A

Identifying vulnerabilities involves multiple methods:

  • Automated scanning (matches assets to known vulnerabilities)
  • Manual testing (finds hidden or novel weaknesses)
  • Security bulletins (vendor advisories and patch releases)
  • Penetration testing (simulates attacks to assess impact)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a vulnerability assessment?

A

Vulnerability assessment’s purpose is to identify weaknesses before they get exploited

This allows cybersecurity analysts to take action to mitigate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability assessments are required for compliance with various security standards or regulations. True or False?

A

TRUE

Ongoing assessments help maintain compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What types of devices can be assessed during a vulnerability assessment?

A
  • Firewall appliances
  • Individual hosts (servers, desktops, laptops, mobile devices)
  • Network perimeter devices (Wi-Fi routers, regular routers)

Each type of device needs periodic scanning to identify vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do vulnerability assessments contribute to risk management?

A

Vulnerability assessments are the best tools for assessing risk

This assessment feeds directly into the overall risk management strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What types of applications can be evaluated through vulnerability assessments?

A
  • Web applications
  • Internal business processes

Applications should ideally be protected with security measures like web application firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What common web attacks should web applications be protected against during a vulnerability assessment? List at least two.

A
  • Injection attacks
  • Cross-site scripting attacks
  • Directory traversal attacks

These are examples of vulnerabilities that can be identified through assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: Vulnerability assessments should be run _______.

A

periodically

Regular assessments help maintain security and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is a vulnerability assessment the same as a security audit? True or False?

A

FALSE

While both assess security, they have different scopes and purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is penetration testing often called?

A

Pen testing or Active testing

Penetration testing is an active form of security scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does penetration testing differ from vulnerability scanning?

A
  • Penetration testing is active
  • Vulnerability scanning is passive

Vulnerability scans seek vulnerabilities without trying to exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does penetration testing include before exploiting discovered weaknesses?

A

vulnerability scanning

This initial step helps identify weaknesses that can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false: A detected vulnerability guarantees success in breaking into a system during penetration testing.

A

FALSE

Just because a vulnerability is detected does not mean penetration tests will succeed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What tools are used in penetration testing?

A

Tools designed to exploit vulnerabilities are used in pen testing

These tools are specifically created to test security by exploiting weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary goal of a penetration test?

A

The primary goal is to uncover flaws, especially those that are easily exploitable

Mitigate those problems immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The red team in penetration testing is also known as what?

A

Offensive team

This team executes the penetration testing against various targets.

18
Q

What types of targets can a red team conduct penetration testing against?

A
  • Network
  • Databases
  • Applications
  • Specific devices

Pen tests can also involve non-technical methods like social engineering.

19
Q

What is the role of the blue team in penetration testing?

A

Defensive team

This team secures and monitors IT systems.

20
Q

What does the blue team monitor for?

A

Security events

This is a key responsibility of a cybersecurity analyst.

21
Q

True or false: The blue team aims to detect and prevent red team attacks.

A

TRUE

Ideally, the blue team can stop attacks while they are occurring.

22
Q

What can be learned from conducting penetration tests?

A
  • Enhance security awareness
  • New mitigation strategies and techniques
  • High-level overview of vulnerabilities

Information from pen tests can be used in training materials for staff.

23
Q

What is a potential benefit of analyzing the results of penetration testing?

A

The potential benefit is to make improvements based on testing results

This can lead to better security practices and awareness.

24
Q

What does critical infrastructure refer to?

A

Critical infrastructure refers to the physical and virtual infrastructure needed by society

This includes IT systems that provide overall health and safety for societies and economies.

25
What is **operational technology** (OT)?
***OT*** hardware and software used to control industrial processes ## Footnote OT is essential for securing critical infrastructure.
26
What are **industrial control systems** (ICS)?
***ICS*** automate and control industrial processes ## Footnote ICS includes equipment like robotics, sensors, and control systems.
27
What is the purpose of **Supervisory Control and Data Acquisition** (SCADA)?
**SCADA** describes the equipment that controls industrial processes.
28
What types of operating systems might be used in a SCADA environment?
* OS-9 * VxWorks * Linux variants * Windows variants ## Footnote Different devices may run specialized operating systems.
29
Name some **targets of attackers** in critical infrastructure.
* Power grids * Fuel pipelines * Cellular services * Water supply systems * Hospitals (ransomware) ## Footnote These attacks can disrupt essential services.
30
What are **programmable logic controllers** (PLCs)?
***PLCs*** physical firmware devices that execute *SCADA instructions* ## Footnote PLCs communicate with industrial devices and transmit telemetry data.
31
What is a **distributed control system** (DCS)?
***DCS*** a system consisting of interconnected components controlling industrial processes ## Footnote DCS includes PLCs, sensors, and control stations.
32
What is an **air-gapped network**?
**Air-gapped network** is a netowork with *no external connections to the Internet* ## Footnote Air-gapped networks enhance security for industrial control environments.
33
Why is it important to consider the **device supply chain** in industrial control networks?
**Device supply chain** is important to *ensure components are not sourced from hostile nations* ## Footnote Supply chain security is crucial for maintaining the integrity of the network.
34
True or false: **USB thumb drives** are recommended for use in air-gapped industrial control networks.
FALSE ## Footnote USB drives can introduce malware or security breaches.
35
Which nmap command line parameter attempts to identify the OS?
***nmap -O***
36
Which command allows you to interact with the **Metasploit framework**?
***msfconsole***
37
Which threat hunting model takes the ***proactive*** approach?
***Hypothesis-based***
38
How do *vulnerability scanning tools* **differ** from *network scanning tools*?
* **Network scanners** map what exists Network scanning = discovery “What hosts, ports, services, and pathways exist on this network?” * **Vulnerability scanners** judge what’s weak | Vulnerability scanning = assessment “Given what exists, what is misconfigured, outdated, or exploitable?” ## Footnote They operate in the same terrain but answer completely different questions |complementary but not interchangeable
39
What type of attack is in effect when *malicious actors use* **Burpsuite**?
Man-in-the-Middle attack (MiTM)
40
Which **documented set of procedures** helps an *organization detect, respond to, and limit the consequences of a cybersecurity incident*?
***Incident Response Plan***
41
Which **phase of the incident response process** *focuses on limiting the scope and magnitude of an incident and preventing it from spreading further through the environment*?
***Containment***
42
Which **final stage of the incident response process** involves a review of the incident to identify areas for improvement in future responses and update existing plans and policies?
***Lessons Learned***