CS 205 Final Exam 2024 - Types of Security Testing and VM Lifecycle Steps

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main purpose of vulnerability assessment (VA) in security testing?

  • To identify weaknesses and security holes in IT assets (correct)
  • To automate the process of code review
  • To test the effectiveness of patches and fixes
  • To simulate real-world cyber attacks on systems

Which step in the VM lifecycle involves analyzing assets, examining IP subnets, and looking at potential network traffic issues?

  • Patch systems
  • Prepare scanner
  • Analyze assets (correct)
  • Assess results

What is the main goal of running a vulnerability scan in the VM lifecycle?

  • Generating a report for asset owners (correct)
  • Assessing network performance degradation issues
  • Applying patches and fixes
  • Monitoring the results of the scan

Which activity is NOT part of verifying (re-scanning) in the VM lifecycle?

<p>Evaluating the effectiveness of patches and fixes (C)</p> Signup and view all the answers

What is a common feature of vulnerability scanners like Open VAS, Nessus, Qualys, and Rapid7?

<p>They offer free tools for security testing (A)</p> Signup and view all the answers

In security testing, what distinguishes penetration testing (PT) from vulnerability assessment (VA)?

<p>PT focuses on identifying weaknesses, while VA simulates malicious attacks (C)</p> Signup and view all the answers

According to the given text, which team has primary ownership?

<p>Information Security team (D)</p> Signup and view all the answers

Who is responsible for testing patches in the environment based on the information provided?

<p>IT Ops team (D)</p> Signup and view all the answers

In the context of the provided information, what does 'SCAP-validated vulnerability scanner' primarily scan for?

<p>Code-based vulnerabilities (D)</p> Signup and view all the answers

Which of the following is NOT a stage of Info sec Governance Block as outlined in the text?

<p>Monitoring Intermediate (B)</p> Signup and view all the answers

From the details provided, which type of IT assets do not have a CIS/DISA STIG?

<p>Virtual servers (A)</p> Signup and view all the answers

What activity will be required if 'Recourse and priority' falls under 'Mature' according to the text?

<p>Incident management (D)</p> Signup and view all the answers

What is the purpose of checking the completeness and correctness of controls in the context of cyber security?

<p>To enhance the organization's security posture (B)</p> Signup and view all the answers

In the Cyber Security Maturity Matrix discussed, which level focuses on having Active Directory, Enterprise AV, and Windows OS licensed?

<p>Foundation (C)</p> Signup and view all the answers

What is the difference between a remote exploit and a local exploit?

<p>Remote exploit works over a network without any prior access, while local exploit requires prior access to the vulnerable system. (D)</p> Signup and view all the answers

Why is it important to use only fully supported web browsers & email clients in an organization?

<p>To reduce security vulnerabilities (C)</p> Signup and view all the answers

Which section of the Cyber Security Maturity Matrix focuses on having systems that are monitored regularly for threats?

<p>Monitored (B)</p> Signup and view all the answers

What is the primary reason for ensuring the use of only fully supported browser & email clients according to the text?

<p>To maintain a secure IT environment by reducing vulnerabilities (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

CS 11 Final Exam Flashcards
99 questions
CS 362 Software Development Phases
32 questions
CS 102 CSS Practice Test
25 questions

CS 102 CSS Practice Test

WellBacklitJasmine avatar
WellBacklitJasmine
Use Quizgecko on...
Browser
Browser