Vulnerability Management Exam 27 Questions with Verified Answers
What is Vulnerability Mgmt - CORRECT ANSWER Helps to prioritize and remediate
... [Show More] vulnerabilities by consolidating data from multiple vulnerability scanning tools (Network VA, DAST etc.).
It correlate and help to prioritize the risk (some do this by integrations with Threat Feeds, Asset Priority / tagging etc.) posed by the vulnerabilities to prioritize remediation efforts.
They may NOT have native scanning capabilities and rely on scan data from third party tools.
Recommended for organisations using multiple scanning tools who want to streamline their vulnerability Management process.
Key Use cases - CORRECT ANSWER Key Use cases:
--> Consolidate Vulnerability Assessment Results
--> Prioritize Vulnerabilities by its nature
--> Efficient Patch Management
Common Vulnerability Scoring System (CVSS) - CORRECT ANSWER Common Vulnerability Scoring System (CVSS) base scores provide additional guidance about a vulnerability, giving a detailed severity rating by scoring the constant aspects of a vulnerability: Access Vector, Access Complexity, Authentication, Confidentiality, Integrity, and Availability.
What is CVE? - CORRECT ANSWER CVE is a list of information security vulnerabilities and exposures that aims to provide common names for publicly known problems.
The goal of CVE is to make it easier to share data across separate vulnerability capabilities (tools, repositories, and services) with this "common enumeration."
What is a "Vulnerability?" - CORRECT ANSWER An information security "vulnerability" is a mistake in software that can be directly used by a hacker to gain access to a system or network.
What is an "Exposure?" - CORRECT ANSWER An information security exposure is a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network
The Common Vulnerability Scoring System (CVSS) - CORRECT ANSWER CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat.
Scores are calculated based on a formula that depends on several metrics that approximate ease of exploit and the impact of exploit.
Scores range from 0 to 10, with 10 being the most severe
Vulnerability Scanning Options - CORRECT ANSWER 1. Import of vulnerability scan data from 3rd party
- Tenable Nessus and SC, Qualys
2. Caveo Scan tool
- SCAP / STIGS open source options
STIGS - CORRECT ANSWER - Pass / fail data for STIG checklist
- Scanner run on end point with STIG checklist
- Pull information on pass and fails
- Put results into results file
Describe the Risk Scoring Method - CORRECT ANSWER * Composite scoring will be a combination of CVSS and CVE
* Need to factor in weighting factors such as BIA HML, Location (Int / DMZ)
* Asset scoring will be the average across the vulnerabilties
* System / Location / Org Scoring will be the average of all vulnerabilities and not the average of each asset
Vulnerability Management - CORRECT ANSWER * Repositories (CVE / CCE / CCI)
* IA to Vulnerability Mapping
* Regulation and Certificates
* IA Control Mapping
Vulnerability Assessment - CORRECT ANSWER Seeks to identify any issues in a network, application, database, or other systems prior to it being used that might compromise the system
Vulnerability Management - CORRECT ANSWER Practice of finding and mitigating the vulnerabilities in computers and networks
These 3 questions can help to scope your assessments - CORRECT ANSWER 1. What is the value of the information? § 2. What is the threat your system is facing? § 3. What is the mitigation that could be deployed?
Nessus, Qualysguard, and AlienVault are used for vulnerability assessments - CORRECT ANSWER
Penetration Testing - CORRECT ANSWER Penetration tests look at a network's vulnerabilities from the outside
Tabletop Exercise (TTX) - CORRECT ANSWER Exercise that uses an incident scenario against a framework of controls or a red team
Open Vulnerability and Assessment Language (OVAL) - CORRECT ANSWER A standard designed to regulate the transfer of secure public information across networks and the Internet utilizing any security tools and services available
Vulnerability Assessment - CORRECT ANSWER Baselining of the network to assess the current security state of computers, servers, network devices, and the entire network in genera
Network Mapping - CORRECT ANSWER Discovery and documentation of physical and logical connectivity that exists in the network
Vulnerability Scanning - CORRECT ANSWER A technique that identifies threats on the network without exploiting them
Network Sniffing - CORRECT ANSWER The process of finding and investigating other computers on the network by analyzing the network traffic or capturing the packets being sent
Dictionary Attack - CORRECT ANSWER Method where a program attempts to guess the password by using a list of possible passwords
Brute-Force Attack - CORRECT ANSWER Method where a program attempts to try every possible combination until it cracks the password
Cryptanalysis Attack - CORRECT ANSWER Comparing a precomputed encrypted password to a value in a lookup table
Rainbow Table - CORRECT ANSWER List of precomputed valued used to more quickly break a password since values don't have to be calculated for each password being guessed
Rubber Hose Attack - CORRECT ANSWER Attempt to crack a password by threatening or causing a person physical harm in order to make them tell you the password [Show Less]