1_7_2 Section 1 – Attacks, Threats, and Vulnerabilities - 1.7 – Security Assessments - Vulnerability Scans
42 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a vulnerability scan?

  • To gain access to the inner workings of devices
  • To perform penetration testing on networks
  • To determine potential vulnerabilities in systems (correct)
  • To encrypt data transmission over the internet
  • What is a port scan, and what does it do?

  • A scan that determines which ports are responding on an IP address (correct)
  • A process that encrypts data transmission over ports
  • A type of virus scan that targets network devices
  • A type of penetration test that targets user accounts
  • Why is Telnet considered a potential vulnerability?

  • Because it sends unencrypted data (correct)
  • Because it's only used for internal networks
  • Because it's an outdated protocol
  • Because it's commonly used by hackers
  • What is the key difference between a vulnerability scan and a penetration test?

    <p>One is used to identify vulnerabilities, while the other is used to exploit them</p> Signup and view all the answers

    From whose perspective should vulnerability scans be performed?

    <p>From the perspective of the attacker</p> Signup and view all the answers

    What types of devices should be included in vulnerability scans?

    <p>All devices connected to the network</p> Signup and view all the answers

    What is the primary benefit of having the latest version of signatures for a vulnerability scanner?

    <p>To filter out invalid results and detect all vulnerabilities</p> Signup and view all the answers

    What should you do if you encounter a false positive or false negative during a vulnerability scan?

    <p>Work with the scanner manufacturer to update the database</p> Signup and view all the answers

    What is an alternative to using a formal vulnerability scanner to identify security issues?

    <p>Performing a configuration review of an operating system</p> Signup and view all the answers

    What should you check on a workstation to ensure security?

    <p>All of the above</p> Signup and view all the answers

    What is a concern when reviewing security devices themselves?

    <p>Checking for misconfigured firewall rules</p> Signup and view all the answers

    What is the primary concern when reviewing servers?

    <p>Checking for access control and user permissions</p> Signup and view all the answers

    What is the primary purpose of a vulnerability scanner?

    <p>To gather information about system vulnerabilities</p> Signup and view all the answers

    What type of scan is run from the perspective of someone who does not have access to the network?

    <p>Non credentialed scan</p> Signup and view all the answers

    What is the difference between a vulnerability scan and a penetration test?

    <p>A penetration test tries to exploit vulnerabilities, while a vulnerability scan does not</p> Signup and view all the answers

    Why should you never run a vulnerability scan on a network without permission?

    <p>It may crash the system or make it unavailable</p> Signup and view all the answers

    What type of scan is run from the perspective of someone who has rights and permissions to log in?

    <p>Credential scan</p> Signup and view all the answers

    What is the purpose of running a vulnerability scan as an insider with full access to the system?

    <p>To gather information about the system's vulnerabilities</p> Signup and view all the answers

    What is the term for a vulnerability scan that does not attempt to take advantage of vulnerabilities found?

    <p>Non intrusive scan</p> Signup and view all the answers

    Why should you understand what a vulnerability scan will do before running it?

    <p>To ensure the scan does not crash the system or make it unavailable</p> Signup and view all the answers

    What can be done after a vulnerability scan is complete to verify the findings?

    <p>Find a specific exploit to attack the vulnerability</p> Signup and view all the answers

    What is the benefit of running a vulnerability scan internally as an insider with full access to the system?

    <p>It helps to identify vulnerabilities that can be exploited from the inside</p> Signup and view all the answers

    Which database is synchronized with the CVE list from MITRE?

    <p>National Vulnerability Database</p> Signup and view all the answers

    What is the main purpose of the Common Vulnerability Scoring System?

    <p>To assign a severity score to a vulnerability</p> Signup and view all the answers

    What type of vulnerability might be identified by a vulnerability scan due to a lack of security control?

    <p>Lack of antivirus software</p> Signup and view all the answers

    What is the term for a reported vulnerability that is found to not exist on a device after further research?

    <p>False positive</p> Signup and view all the answers

    What is the difference between a false positive and a low severity vulnerability?

    <p>A low severity vulnerability is a real vulnerability, while a false positive is not</p> Signup and view all the answers

    What is the term for a vulnerability that exists on a system but is not identified by a scanner?

    <p>False negative</p> Signup and view all the answers

    What is the purpose of a vulnerability scan?

    <p>To identify potential security risks and vulnerabilities</p> Signup and view all the answers

    What is the range of scores assigned by the Common Vulnerability Scoring System?

    <p>0 to 10</p> Signup and view all the answers

    What type of vulnerability might be identified by a vulnerability scan due to a misconfiguration?

    <p>NFS misconfiguration</p> Signup and view all the answers

    Why is it important to research further after a vulnerability scan identifies a vulnerability?

    <p>To verify the existence of the vulnerability</p> Signup and view all the answers

    What is the implication of a Unix operating system unsupported version detection vulnerability?

    <p>The system will have additional vulnerabilities as time goes on</p> Signup and view all the answers

    What is the purpose of a vulnerability scanner's database?

    <p>To constantly update its knowledge of known vulnerabilities</p> Signup and view all the answers

    What type of vulnerability is associated with WhatsApp desktop app CVE-2020-1889?

    <p>Security feature bypass issue</p> Signup and view all the answers

    What is the result of a vulnerability scan on a network device?

    <p>Information about misconfigured firewalls and open ports</p> Signup and view all the answers

    Where can you find information about a specific CVE?

    <p>All of the above</p> Signup and view all the answers

    What is the purpose of a vulnerability scan?

    <p>To find every possible vulnerability that the scanner knows about</p> Signup and view all the answers

    What is an example of a web-based application vulnerability?

    <p>An information leak via error message in PHP file UCMS</p> Signup and view all the answers

    What is the outcome of a vulnerability scan on a system with Ubuntu 8.04?

    <p>The system is no longer supported and will have additional vulnerabilities</p> Signup and view all the answers

    What should you do before and after performing a vulnerability scan?

    <p>Perform research prior to the scan, and afterwards to make decisions</p> Signup and view all the answers

    What is CVE-2022-5079 related to?

    <p>An authenticated command injection issue on D-Link DCS-2530L routers</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser