MODULE 2

5.0(2)
studied byStudied by 25 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

Avd Info QuaSsurance

Last updated 6:28 PM on 10/5/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

41 Terms

1
New cards

Vulnerability scanners

assesses computers, computer systems, networks, or applications for weaknesses. It can help to automate security auditing by scanning the network for security risks and producing a prioritized list to address vulnerabilities.

2
New cards

• Use of default passwords or common passwords

• Missing patches

• Open ports

• Misconfigurations in operating systems and software

• Active IP addresses, including any unexpected devices connected

A vulnerability scanner looks for the following types of vulnerabilities:

3
New cards

Vulnerability scanning

key to identifying vulnerabilities, misconfigurations, and a lack

of security controls for organizations with networks that include segments, routers, firewalls,

servers, and other devices.

4
New cards
  • Nessus

  • Retina

  • Core Impact

  • GFI Lan Guard

Commonly used vulnerability scanners on the market:

5
New cards

Network scanners

it probe hosts for open ports, enumerate information about users and groups

and look for known vulnerabilities on the network.

6
New cards

Application scanners

it access application source code to test an application from the inside (they do not run the application).

7
New cards

Web application scanners

scanners that identify vulnerabilities in web applications.

8
New cards

False positive

Identifying a vulnerability where none exists.

9
New cards

False negative

not identifying an existing vulnerability

10
New cards

Intrusive scans

 it tries to exploit vulnerabilities and may even crash the target

11
New cards

Security Information and Event Management (SIEM) 

use log collectors to aggregate log data from sources such as security devices, network devices, servers, and applications.

12
New cards

Security Orchestration Automation and Response (SOAR)

allow an organization to collect data about security threats from various sources and respond to low-level events without human intervention.

13
New cards

• Threat and vulnerability management

• Security incident response

• Security operations automation

SOAR has three important capabilities:

14
New cards

• Identify internal and external threats

• Monitor activity and resource usage

• Conduct compliance reporting for audits

• Support incident response

The goals of a SIEM system for security monitoring are:

15
New cards

Operations Security

is concerned with the day-to-day practices necessary to first deploy and later

maintain a secure system.

16
New cards

security test and evaluation (ST&E)

is an examination of the protective measures that are placed on

an operational network.

17
New cards

Active reconnaissance


directly interacting with network systems to gather information using many of the tools that are used in penetration testing and vulnerability assessment.

18
New cards

Passive reconnaissance

indirectly learning about the network and network users through searches from information sources that range from Facebook to leaked password details on the dark web.

19
New cards

Penetration testing

simulate attacks from malicious sources. The goal is to determine the feasibility of an attack and consequences if one were to occur.

20
New cards

Network scanning

Includes software that can ping computers, scan for listening TCP ports,

and display which types of resources are available on the network.

21
New cards

Vulnerability scanning

This includes software that can detect potential weaknesses in the tested

systems. These weaknesses can include misconfiguration, blank or default passwords, or potential targets for DoS attacks.

22
New cards

Password cracking

This includes software that is used to test and detect weak passwords that should be changed. Password policies must include guidelines to prevent weak passwords.

23
New cards

Log review

a type of network testing which system administrators should review security logs to identify potential security threats. Filtering software to scan lengthy log files should be used to help discover abnormal activity to investigate.

24
New cards

Integrity checkers

a type of network testing which a system detects and reports on changes in

the system. Most of the monitoring is focused on the file system.

25
New cards

Virus detection

a type of network testing which a virus or anti-malware detection software should be used to identify and remove computer viruses and other malware.

26
New cards

Security Information and Event Management

SIEM stands for

27
New cards

Security Orchestration Automation Response

SOAR stands for

28
New cards

Nmap/Zenmap
SuperScan
SIEM
GFI LANguard
Tripwire
Nessus
L0phtCrack
Metasploit

Network Testing Tools:

29
New cards

Nmap

is a commonly used, low-level scanner that is

available to the public. It has an array of

excellent features which can be used for network mapping

and reconnaissance.

30
New cards

SuperScan

is a Microsoft Windows port scanning tool. It runs on most versions of Windows and requires administrator privileges.

31
New cards

pen testing

a testing that simulates methods that an attacker would use to

gain unauthorized access to a network and compromise the systems and allows an organization to understand how well it would tolerate a real attack.

32
New cards

Black box testing

is the least time consuming and the least expensive. The specialist has no knowledge of the inner system and tries to attack it from the view of a regular user.

33
New cards

Gray box testing

is a combination of black box and white box testing. The specialist will have some limited knowledge about the system, so it is a partially known environment.

34
New cards

White box testing

is the most time consuming and the most expensive because it is conducted by a specialist with knowledge of how the system works.

35
New cards

Planning
Discovery
Attack
Report

4 phases of pen testing:

36
New cards

planning

this phase establishes the rules of engagement for conducting the test

37
New cards

discovery

this phase includes conducting reconnaissance on the target to gain information.

38
New cards

Attack

At this phase, you seek to gain access or penetrate the system using the

information gathered in the previous phase. 

39
New cards

persistence

The tester may try to install additional tools or plant a

backdoor — this process is known as

40
New cards

Reporting 

At this phase, the tester delivers to the organization detailed documentation that includes the vulnerabilities identified, actions taken and the results.

41
New cards

Packet analyzers

they intercept, and log network traffic. They perform the below functions —

either for legitimate purposes like troubleshooting or illegitimate purposes such as compromising data. Most common example is Wireshark.

Explore top notes

note
Unit 6: Africa, 1100–1980 CE
Updated 1062d ago
0.0(0)
note
诗歌 P1
Updated 693d ago
0.0(0)
note
Biological molecules (2.3-2.4)
Updated 1327d ago
0.0(0)
note
AP Psychology Study Guide
Updated 662d ago
0.0(0)
note
Ara Pacis
Updated 199d ago
0.0(0)
note
Exercise Physiology
Updated 794d ago
0.0(0)
note
Unit 6: Africa, 1100–1980 CE
Updated 1062d ago
0.0(0)
note
诗歌 P1
Updated 693d ago
0.0(0)
note
Biological molecules (2.3-2.4)
Updated 1327d ago
0.0(0)
note
AP Psychology Study Guide
Updated 662d ago
0.0(0)
note
Ara Pacis
Updated 199d ago
0.0(0)
note
Exercise Physiology
Updated 794d ago
0.0(0)

Explore top flashcards

flashcards
La Technologie vocab
52
Updated 1242d ago
0.0(0)
flashcards
Research Exam 1
46
Updated 510d ago
0.0(0)
flashcards
Cations & Anions
62
Updated 189d ago
0.0(0)
flashcards
Science 1206 Ecology Review #1
40
Updated 992d ago
0.0(0)
flashcards
Unit 1-2 BIO Midterms
49
Updated 1098d ago
0.0(0)
flashcards
AP Classrooms Unit 7
24
Updated 684d ago
0.0(0)
flashcards
IGCSE BIOLOGY 0610
491
Updated 661d ago
0.0(0)
flashcards
La Technologie vocab
52
Updated 1242d ago
0.0(0)
flashcards
Research Exam 1
46
Updated 510d ago
0.0(0)
flashcards
Cations & Anions
62
Updated 189d ago
0.0(0)
flashcards
Science 1206 Ecology Review #1
40
Updated 992d ago
0.0(0)
flashcards
Unit 1-2 BIO Midterms
49
Updated 1098d ago
0.0(0)
flashcards
AP Classrooms Unit 7
24
Updated 684d ago
0.0(0)
flashcards
IGCSE BIOLOGY 0610
491
Updated 661d ago
0.0(0)