CS 205 Final Exam 2024 - Types of Security Testing and VM Lifecycle Steps
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main purpose of vulnerability assessment (VA) in security testing?

  • To identify weaknesses and security holes in IT assets (correct)
  • To automate the process of code review
  • To test the effectiveness of patches and fixes
  • To simulate real-world cyber attacks on systems

Which step in the VM lifecycle involves analyzing assets, examining IP subnets, and looking at potential network traffic issues?

  • Patch systems
  • Prepare scanner
  • Analyze assets (correct)
  • Assess results

What is the main goal of running a vulnerability scan in the VM lifecycle?

  • Generating a report for asset owners (correct)
  • Assessing network performance degradation issues
  • Applying patches and fixes
  • Monitoring the results of the scan

Which activity is NOT part of verifying (re-scanning) in the VM lifecycle?

<p>Evaluating the effectiveness of patches and fixes (C)</p> Signup and view all the answers

What is a common feature of vulnerability scanners like Open VAS, Nessus, Qualys, and Rapid7?

<p>They offer free tools for security testing (A)</p> Signup and view all the answers

In security testing, what distinguishes penetration testing (PT) from vulnerability assessment (VA)?

<p>PT focuses on identifying weaknesses, while VA simulates malicious attacks (C)</p> Signup and view all the answers

According to the given text, which team has primary ownership?

<p>Information Security team (D)</p> Signup and view all the answers

Who is responsible for testing patches in the environment based on the information provided?

<p>IT Ops team (D)</p> Signup and view all the answers

In the context of the provided information, what does 'SCAP-validated vulnerability scanner' primarily scan for?

<p>Code-based vulnerabilities (D)</p> Signup and view all the answers

Which of the following is NOT a stage of Info sec Governance Block as outlined in the text?

<p>Monitoring Intermediate (B)</p> Signup and view all the answers

From the details provided, which type of IT assets do not have a CIS/DISA STIG?

<p>Virtual servers (A)</p> Signup and view all the answers

What activity will be required if 'Recourse and priority' falls under 'Mature' according to the text?

<p>Incident management (D)</p> Signup and view all the answers

What is the purpose of checking the completeness and correctness of controls in the context of cyber security?

<p>To enhance the organization's security posture (B)</p> Signup and view all the answers

In the Cyber Security Maturity Matrix discussed, which level focuses on having Active Directory, Enterprise AV, and Windows OS licensed?

<p>Foundation (C)</p> Signup and view all the answers

What is the difference between a remote exploit and a local exploit?

<p>Remote exploit works over a network without any prior access, while local exploit requires prior access to the vulnerable system. (D)</p> Signup and view all the answers

Why is it important to use only fully supported web browsers & email clients in an organization?

<p>To reduce security vulnerabilities (C)</p> Signup and view all the answers

Which section of the Cyber Security Maturity Matrix focuses on having systems that are monitored regularly for threats?

<p>Monitored (B)</p> Signup and view all the answers

What is the primary reason for ensuring the use of only fully supported browser & email clients according to the text?

<p>To maintain a secure IT environment by reducing vulnerabilities (B)</p> Signup and view all the answers

More Like This

CS Excel Chapter 1 Practice
50 questions
CS 362 Software Development Phases
32 questions
CS 102 CSS Practice Test
25 questions

CS 102 CSS Practice Test

WellBacklitJasmine avatar
WellBacklitJasmine
Use Quizgecko on...
Browser
Browser