sec+ chapter 16

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

A company discovers that a vulnerability in their web application has been exposed and posted on an information-sharing organization's website. What type of threat intelligence does this represent?

Open-source intelligence (OSINT).

2
New cards

A company with high risk tolerance is MOST likely to take which of the following approaches to a newly discovered but non-critical vulnerability?

Delay remediation and monitor the vulnerability.

3
New cards

A cybersecurity analyst performs a routine scan on the network and finds an unexpected open port on a server. Which of the following is the FIRST step in confirming this finding?

Re-run the vulnerability scan to ensure the result was not a false positive.

4
New cards

After deploying a security patch, which of the following is the BEST way to validate that the vulnerability has been effectively remediated?

Rescan the system to confirm the patch application.

5
New cards

After patching a server, a security administrator should perform which of the following to ensure the patch was applied correctly?

Rescanning.

6
New cards

A security analyst is prioritizing vulnerabilities for remediation. Which of the following factors should be considered?

The CVSS score of the vulnerabilities.

7
New cards

A security analyst receives alerts from an open-source intelligence (OSINT) service about a potential vulnerability in the company’s web server software. Which of the following should be the FIRST action?

Confirm the vulnerability.

8
New cards

During a penetration test, a tester identifies a vulnerability but cannot exploit it due to security controls in place. This situation illustrates which of the following concepts?

Compensating controls.

9
New cards

If an organization wants to evaluate the potential environmental impact of a vulnerability, which of the following should it consider?

The broader context, such as network architecture and external dependencies.

10
New cards

In the context of vulnerability management, what is the primary benefit of a bug bounty program?

It encourages responsible disclosure of vulnerabilities.

11
New cards

In vulnerability management, the term 'exposure factor' is BEST described as which of the following?

The percentage of loss a resource would suffer from a vulnerability exploit.

12
New cards

What is a common method for confirming whether a vulnerability scan result is a false negative?

Attempting to exploit the vulnerability in a controlled environment.

13
New cards

What is the purpose of conducting a system/process audit in vulnerability management?

To check compliance with security policies and identify any deviations.

14
New cards

What is the purpose of performing a dynamic analysis on an application?

To monitor the application in a running state to identify potential security issues.

15
New cards

What is the role of vulnerability classification in vulnerability management?

To determine the impact level of vulnerabilities on different systems.

16
New cards

When a security researcher discloses a vulnerability to the public after the vendor has failed to address it within a reasonable timeframe, this is known as:

full disclosure

17
New cards

When managing vulnerabilities, what is the purpose of using the Common Vulnerability Scoring System (CVSS)?

To provide a quantitative measure of the severity of identified vulnerabilities.

18
New cards

Which of the following best describes the use of a threat feed in vulnerability management?

A stream of data related to potential threats from various sources, including OSINT and dark web.

19
New cards

Which of the following is a vulnerability response that might be used if patching is not immediately possible?

Implementing compensating controls.

20
New cards

Which vulnerability identification method involves analyzing the source code of an application without executing it?

Static analysis.