1_7_2 Section 1 – Attacks, Threats, and Vulnerabilities - 1.7 – Security Assessments - Vulnerability Scans

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a vulnerability scan?

  • To gain access to the inner workings of devices
  • To perform penetration testing on networks
  • To determine potential vulnerabilities in systems (correct)
  • To encrypt data transmission over the internet

What is a port scan, and what does it do?

  • A scan that determines which ports are responding on an IP address (correct)
  • A process that encrypts data transmission over ports
  • A type of virus scan that targets network devices
  • A type of penetration test that targets user accounts

Why is Telnet considered a potential vulnerability?

  • Because it sends unencrypted data (correct)
  • Because it's only used for internal networks
  • Because it's an outdated protocol
  • Because it's commonly used by hackers

What is the key difference between a vulnerability scan and a penetration test?

<p>One is used to identify vulnerabilities, while the other is used to exploit them (A)</p> Signup and view all the answers

From whose perspective should vulnerability scans be performed?

<p>From the perspective of the attacker (C)</p> Signup and view all the answers

What types of devices should be included in vulnerability scans?

<p>All devices connected to the network (C)</p> Signup and view all the answers

What is the primary benefit of having the latest version of signatures for a vulnerability scanner?

<p>To filter out invalid results and detect all vulnerabilities (D)</p> Signup and view all the answers

What should you do if you encounter a false positive or false negative during a vulnerability scan?

<p>Work with the scanner manufacturer to update the database (B)</p> Signup and view all the answers

What is an alternative to using a formal vulnerability scanner to identify security issues?

<p>Performing a configuration review of an operating system (D)</p> Signup and view all the answers

What should you check on a workstation to ensure security?

<p>All of the above (D)</p> Signup and view all the answers

What is a concern when reviewing security devices themselves?

<p>Checking for misconfigured firewall rules (B)</p> Signup and view all the answers

What is the primary concern when reviewing servers?

<p>Checking for access control and user permissions (A)</p> Signup and view all the answers

What is the primary purpose of a vulnerability scanner?

<p>To gather information about system vulnerabilities (C)</p> Signup and view all the answers

What type of scan is run from the perspective of someone who does not have access to the network?

<p>Non credentialed scan (C)</p> Signup and view all the answers

What is the difference between a vulnerability scan and a penetration test?

<p>A penetration test tries to exploit vulnerabilities, while a vulnerability scan does not (D)</p> Signup and view all the answers

Why should you never run a vulnerability scan on a network without permission?

<p>It may crash the system or make it unavailable (B)</p> Signup and view all the answers

What type of scan is run from the perspective of someone who has rights and permissions to log in?

<p>Credential scan (B)</p> Signup and view all the answers

What is the purpose of running a vulnerability scan as an insider with full access to the system?

<p>To gather information about the system's vulnerabilities (D)</p> Signup and view all the answers

What is the term for a vulnerability scan that does not attempt to take advantage of vulnerabilities found?

<p>Non intrusive scan (D)</p> Signup and view all the answers

Why should you understand what a vulnerability scan will do before running it?

<p>To ensure the scan does not crash the system or make it unavailable (B)</p> Signup and view all the answers

What can be done after a vulnerability scan is complete to verify the findings?

<p>Find a specific exploit to attack the vulnerability (C)</p> Signup and view all the answers

What is the benefit of running a vulnerability scan internally as an insider with full access to the system?

<p>It helps to identify vulnerabilities that can be exploited from the inside (D)</p> Signup and view all the answers

Which database is synchronized with the CVE list from MITRE?

<p>National Vulnerability Database (C)</p> Signup and view all the answers

What is the main purpose of the Common Vulnerability Scoring System?

<p>To assign a severity score to a vulnerability (A)</p> Signup and view all the answers

What type of vulnerability might be identified by a vulnerability scan due to a lack of security control?

<p>Lack of antivirus software (B)</p> Signup and view all the answers

What is the term for a reported vulnerability that is found to not exist on a device after further research?

<p>False positive (A)</p> Signup and view all the answers

What is the difference between a false positive and a low severity vulnerability?

<p>A low severity vulnerability is a real vulnerability, while a false positive is not (B)</p> Signup and view all the answers

What is the term for a vulnerability that exists on a system but is not identified by a scanner?

<p>False negative (B)</p> Signup and view all the answers

What is the purpose of a vulnerability scan?

<p>To identify potential security risks and vulnerabilities (C)</p> Signup and view all the answers

What is the range of scores assigned by the Common Vulnerability Scoring System?

<p>0 to 10 (B)</p> Signup and view all the answers

What type of vulnerability might be identified by a vulnerability scan due to a misconfiguration?

<p>NFS misconfiguration (A)</p> Signup and view all the answers

Why is it important to research further after a vulnerability scan identifies a vulnerability?

<p>To verify the existence of the vulnerability (B)</p> Signup and view all the answers

What is the implication of a Unix operating system unsupported version detection vulnerability?

<p>The system will have additional vulnerabilities as time goes on (D)</p> Signup and view all the answers

What is the purpose of a vulnerability scanner's database?

<p>To constantly update its knowledge of known vulnerabilities (D)</p> Signup and view all the answers

What type of vulnerability is associated with WhatsApp desktop app CVE-2020-1889?

<p>Security feature bypass issue (B)</p> Signup and view all the answers

What is the result of a vulnerability scan on a network device?

<p>Information about misconfigured firewalls and open ports (B)</p> Signup and view all the answers

Where can you find information about a specific CVE?

<p>All of the above (D)</p> Signup and view all the answers

What is the purpose of a vulnerability scan?

<p>To find every possible vulnerability that the scanner knows about (B)</p> Signup and view all the answers

What is an example of a web-based application vulnerability?

<p>An information leak via error message in PHP file UCMS (C)</p> Signup and view all the answers

What is the outcome of a vulnerability scan on a system with Ubuntu 8.04?

<p>The system is no longer supported and will have additional vulnerabilities (A)</p> Signup and view all the answers

What should you do before and after performing a vulnerability scan?

<p>Perform research prior to the scan, and afterwards to make decisions (D)</p> Signup and view all the answers

What is CVE-2022-5079 related to?

<p>An authenticated command injection issue on D-Link DCS-2530L routers (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser