MODULE 2

5.0(2)
Studied by 25 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

Avd Info QuaSsurance

Last updated 6:28 PM on 10/5/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

41 Terms

1
New cards

Vulnerability scanners

assesses computers, computer systems, networks, or applications for weaknesses. It can help to automate security auditing by scanning the network for security risks and producing a prioritized list to address vulnerabilities.

2
New cards

• Use of default passwords or common passwords

• Missing patches

• Open ports

• Misconfigurations in operating systems and software

• Active IP addresses, including any unexpected devices connected

A vulnerability scanner looks for the following types of vulnerabilities:

3
New cards

Vulnerability scanning

key to identifying vulnerabilities, misconfigurations, and a lack

of security controls for organizations with networks that include segments, routers, firewalls,

servers, and other devices.

4
New cards
  • Nessus

  • Retina

  • Core Impact

  • GFI Lan Guard

Commonly used vulnerability scanners on the market:

5
New cards

Network scanners

it probe hosts for open ports, enumerate information about users and groups

and look for known vulnerabilities on the network.

6
New cards

Application scanners

it access application source code to test an application from the inside (they do not run the application).

7
New cards

Web application scanners

scanners that identify vulnerabilities in web applications.

8
New cards

False positive

Identifying a vulnerability where none exists.

9
New cards

False negative

not identifying an existing vulnerability

10
New cards

Intrusive scans

 it tries to exploit vulnerabilities and may even crash the target

11
New cards

Security Information and Event Management (SIEM) 

use log collectors to aggregate log data from sources such as security devices, network devices, servers, and applications.

12
New cards

Security Orchestration Automation and Response (SOAR)

allow an organization to collect data about security threats from various sources and respond to low-level events without human intervention.

13
New cards

• Threat and vulnerability management

• Security incident response

• Security operations automation

SOAR has three important capabilities:

14
New cards

• Identify internal and external threats

• Monitor activity and resource usage

• Conduct compliance reporting for audits

• Support incident response

The goals of a SIEM system for security monitoring are:

15
New cards

Operations Security

is concerned with the day-to-day practices necessary to first deploy and later

maintain a secure system.

16
New cards

security test and evaluation (ST&E)

is an examination of the protective measures that are placed on

an operational network.

17
New cards

Active reconnaissance


directly interacting with network systems to gather information using many of the tools that are used in penetration testing and vulnerability assessment.

18
New cards

Passive reconnaissance

indirectly learning about the network and network users through searches from information sources that range from Facebook to leaked password details on the dark web.

19
New cards

Penetration testing

simulate attacks from malicious sources. The goal is to determine the feasibility of an attack and consequences if one were to occur.

20
New cards

Network scanning

Includes software that can ping computers, scan for listening TCP ports,

and display which types of resources are available on the network.

21
New cards

Vulnerability scanning

This includes software that can detect potential weaknesses in the tested

systems. These weaknesses can include misconfiguration, blank or default passwords, or potential targets for DoS attacks.

22
New cards

Password cracking

This includes software that is used to test and detect weak passwords that should be changed. Password policies must include guidelines to prevent weak passwords.

23
New cards

Log review

a type of network testing which system administrators should review security logs to identify potential security threats. Filtering software to scan lengthy log files should be used to help discover abnormal activity to investigate.

24
New cards

Integrity checkers

a type of network testing which a system detects and reports on changes in

the system. Most of the monitoring is focused on the file system.

25
New cards

Virus detection

a type of network testing which a virus or anti-malware detection software should be used to identify and remove computer viruses and other malware.

26
New cards

Security Information and Event Management

SIEM stands for

27
New cards

Security Orchestration Automation Response

SOAR stands for

28
New cards

Nmap/Zenmap
SuperScan
SIEM
GFI LANguard
Tripwire
Nessus
L0phtCrack
Metasploit

Network Testing Tools:

29
New cards

Nmap

is a commonly used, low-level scanner that is

available to the public. It has an array of

excellent features which can be used for network mapping

and reconnaissance.

30
New cards

SuperScan

is a Microsoft Windows port scanning tool. It runs on most versions of Windows and requires administrator privileges.

31
New cards

pen testing

a testing that simulates methods that an attacker would use to

gain unauthorized access to a network and compromise the systems and allows an organization to understand how well it would tolerate a real attack.

32
New cards

Black box testing

is the least time consuming and the least expensive. The specialist has no knowledge of the inner system and tries to attack it from the view of a regular user.

33
New cards

Gray box testing

is a combination of black box and white box testing. The specialist will have some limited knowledge about the system, so it is a partially known environment.

34
New cards

White box testing

is the most time consuming and the most expensive because it is conducted by a specialist with knowledge of how the system works.

35
New cards

Planning
Discovery
Attack
Report

4 phases of pen testing:

36
New cards

planning

this phase establishes the rules of engagement for conducting the test

37
New cards

discovery

this phase includes conducting reconnaissance on the target to gain information.

38
New cards

Attack

At this phase, you seek to gain access or penetrate the system using the

information gathered in the previous phase. 

39
New cards

persistence

The tester may try to install additional tools or plant a

backdoor — this process is known as

40
New cards

Reporting 

At this phase, the tester delivers to the organization detailed documentation that includes the vulnerabilities identified, actions taken and the results.

41
New cards

Packet analyzers

they intercept, and log network traffic. They perform the below functions —

either for legitimate purposes like troubleshooting or illegitimate purposes such as compromising data. Most common example is Wireshark.

Explore top notes

note
Learn to Lead Chapter 1 Review
Updated 401d ago
0.0(0)
note
Chapter 19 - Types of Selection
Updated 1310d ago
0.0(0)
note
Chapter 11: Sound
Updated 1043d ago
0.0(0)
note
WW2 1939-1945
Updated 1398d ago
0.0(0)
note
ANATOMY
Updated 1423d ago
0.0(0)
note
Learn to Lead Chapter 1 Review
Updated 401d ago
0.0(0)
note
Chapter 19 - Types of Selection
Updated 1310d ago
0.0(0)
note
Chapter 11: Sound
Updated 1043d ago
0.0(0)
note
WW2 1939-1945
Updated 1398d ago
0.0(0)
note
ANATOMY
Updated 1423d ago
0.0(0)

Explore top flashcards

flashcards
unit 4
126
Updated 1129d ago
0.0(0)
flashcards
ķīmija
21
Updated 1223d ago
0.0(0)
flashcards
engels unit 4: vocabulary
146
Updated 1124d ago
0.0(0)
flashcards
ADHD- Krysiak
42
Updated 279d ago
0.0(0)
flashcards
English Language Paper 1
36
Updated 691d ago
0.0(0)
flashcards
ENGLISH EXAM
101
Updated 810d ago
0.0(0)
flashcards
Spanish 3: Ser Estar Tener
72
Updated 71d ago
0.0(0)
flashcards
Unit 1 Part 1 - Modules 1 - 3
36
Updated 813d ago
0.0(0)
flashcards
unit 4
126
Updated 1129d ago
0.0(0)
flashcards
ķīmija
21
Updated 1223d ago
0.0(0)
flashcards
engels unit 4: vocabulary
146
Updated 1124d ago
0.0(0)
flashcards
ADHD- Krysiak
42
Updated 279d ago
0.0(0)
flashcards
English Language Paper 1
36
Updated 691d ago
0.0(0)
flashcards
ENGLISH EXAM
101
Updated 810d ago
0.0(0)
flashcards
Spanish 3: Ser Estar Tener
72
Updated 71d ago
0.0(0)
flashcards
Unit 1 Part 1 - Modules 1 - 3
36
Updated 813d ago
0.0(0)