Deck 4: Vulnerability Assessment and Mitigating Attacks

ملء الشاشة (f)
exit full mode
سؤال
Vulnerability scans are usually performed from outside the security perimeter.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ is a comparison of the present state of a system compared to its baseline.

A) Baseline reporting
B) Compliance reporting
C) Baseline assessment
D) Compliance review
سؤال
A ____ in effect takes a snapshot of the current security of the organization.

A) threat analysis
B) vulnerability appraisal
C) risk assessment
D) threat assessment
سؤال
While the code for a program is being written, it is being analyzed by a ____.

A) black box
B) code review
C) white box
D) scanner
سؤال
When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities.

A) threat scanner
B) vulnerability profiler
C) port scanner
D) application profiler
سؤال
If port 20 is available, then an attacker can assume that FTP is being used.
سؤال
A ____ outlines the major security considerations for a system and becomes the starting point for solid security.

A) profile
B) threat
C) control
D) baseline
سؤال
A(n) ____ indicates that no process is listening at this port.

A) open port
B) open address
C) closed address
D) closed port
سؤال
The ____ for software is the code that can be executed by unauthorized users.

A) vulnerability surface
B) risk profile
C) input surface
D) attack surface
سؤال
A(n) ____ is hardware or software that captures packets to decode and analyze its contents.

A) application analyzer
B) protocol analyzer
C) threat profiler
D) system analyzer
سؤال
____ is the probability that a risk will occur in a particular year.

A) SLE
B) ALE
C) ARO
D) EF
سؤال
The first step in a vulnerability assessment is to determine the assets that need to be protected.
سؤال
____ is a means by which an organization can transfer the risk to a third party who can demonstrate a higher capability at managing or reducing risks.

A) Insourcing
B) Outsourcing
C) Outcasting
D) Inhousing
سؤال
A(n) ____ means that the application or service assigned to that port is listening for any instructions.

A) open port
B) empty port
C) closed port
D) interruptible system
سؤال
The goal of ____ is to better understand who the attackers are, why they attack, and what types of attacks might occur.

A) threat mitigation
B) threat profiling
C) risk modeling
D) threat modeling
سؤال
In an empty box test, the tester has no prior knowledge of the network infrastructure that is being tested.
سؤال
____ is the proportion of an asset's value that is likely to be destroyed by a particular risk.

A) SLE
B) ARO
C) EF
D) ER
سؤال
A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files.

A) port scanner
B) write blocker
C) honeypot
D) honeycomb
سؤال
The ____ is the expected monetary loss every time a risk occurs.

A) SLE
B) ARO
C) ALE
D) SRE
سؤال
A healthy security posture results from a sound and workable strategy toward managing risks.
سؤال
A ____ tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications.

A) white box
B) black box
C) replay
D) system
سؤال
The end product of a penetration test is the penetration ____.

A) test profile
B) test report
C) test system
D) test view
سؤال
Discuss one type of asset that an organization might have.
سؤال
____________________ for organizations are intended to identify vulnerabilities and alert network administrators to these problems.
سؤال
Most vulnerability scanners maintain a(n) ____________________ that categorizes and describes the vulnerabilities that it can detect.
سؤال
List and describe the elements that make up a security posture.
سؤال
A(n) ____________________ box test is one in which some limited information has been provided to the tester.
سؤال
List four things that a vulnerability scanner can do.
سؤال
Describe the purpose of a honeypot.
سؤال
A(n) ____________________ scan uses various techniques to avoid detection.
سؤال
Describe a penetration testing report.
سؤال
A ____ is a network set up with intentional vulnerabilities.

A) honeynet
B) honeypot
C) honeycomb
D) honey hole
سؤال
Released in 1995, one of the first tools that was widely used for penetration testing was ____.

A) GOPHER
B) SAINT
C) SATAN
D) NESSUS
سؤال
When using a black box test, many testers use ____________________ tricks to learn about the network infrastructure from inside employees.
سؤال
A security weakness is known as a(n) ____.

A) threat
B) vulnerability
C) risk
D) opportunity
سؤال
List and describe two common uses for a protocol analyzer.
سؤال
Discuss the purpose of OVAL.
سؤال
A(n) ____ examines the current security in a passive method.

A) application scan
B) system scan
C) threat scan
D) vulnerability scan
سؤال
List and describe the three categories that TCP/IP divides port numbers into.
سؤال
When a security hardware device fails or a program aborts, which state should it go into?
سؤال
List two types of hardening techniques.
سؤال
Match between columns
An automated software search through a system for any known security weaknesses
Vulnerability assessment
An automated software search through a system for any known security weaknesses
Asset identification
An automated software search through a system for any known security weaknesses
Threat evaluation
An automated software search through a system for any known security weaknesses
Vulnerability appraisal
An automated software search through a system for any known security weaknesses
Risk assessment
An automated software search through a system for any known security weaknesses
Risk mitigation
An automated software search through a system for any known security weaknesses
Vulnerability scan
An automated software search through a system for any known security weaknesses
Penetration testing
An automated software search through a system for any known security weaknesses
Hardening
Identify what damages could result from the threats
Vulnerability assessment
Identify what damages could result from the threats
Asset identification
Identify what damages could result from the threats
Threat evaluation
Identify what damages could result from the threats
Vulnerability appraisal
Identify what damages could result from the threats
Risk assessment
Identify what damages could result from the threats
Risk mitigation
Identify what damages could result from the threats
Vulnerability scan
Identify what damages could result from the threats
Penetration testing
Identify what damages could result from the threats
Hardening
Designed to actually exploit any weaknesses in systems that are vulnerable
Vulnerability assessment
Designed to actually exploit any weaknesses in systems that are vulnerable
Asset identification
Designed to actually exploit any weaknesses in systems that are vulnerable
Threat evaluation
Designed to actually exploit any weaknesses in systems that are vulnerable
Vulnerability appraisal
Designed to actually exploit any weaknesses in systems that are vulnerable
Risk assessment
Designed to actually exploit any weaknesses in systems that are vulnerable
Risk mitigation
Designed to actually exploit any weaknesses in systems that are vulnerable
Vulnerability scan
Designed to actually exploit any weaknesses in systems that are vulnerable
Penetration testing
Designed to actually exploit any weaknesses in systems that are vulnerable
Hardening
Identify what needs to be protected
Vulnerability assessment
Identify what needs to be protected
Asset identification
Identify what needs to be protected
Threat evaluation
Identify what needs to be protected
Vulnerability appraisal
Identify what needs to be protected
Risk assessment
Identify what needs to be protected
Risk mitigation
Identify what needs to be protected
Vulnerability scan
Identify what needs to be protected
Penetration testing
Identify what needs to be protected
Hardening
Eliminating as many security risks as possible and make the system more secure
Vulnerability assessment
Eliminating as many security risks as possible and make the system more secure
Asset identification
Eliminating as many security risks as possible and make the system more secure
Threat evaluation
Eliminating as many security risks as possible and make the system more secure
Vulnerability appraisal
Eliminating as many security risks as possible and make the system more secure
Risk assessment
Eliminating as many security risks as possible and make the system more secure
Risk mitigation
Eliminating as many security risks as possible and make the system more secure
Vulnerability scan
Eliminating as many security risks as possible and make the system more secure
Penetration testing
Eliminating as many security risks as possible and make the system more secure
Hardening
Identify what to do about threats
Vulnerability assessment
Identify what to do about threats
Asset identification
Identify what to do about threats
Threat evaluation
Identify what to do about threats
Vulnerability appraisal
Identify what to do about threats
Risk assessment
Identify what to do about threats
Risk mitigation
Identify what to do about threats
Vulnerability scan
Identify what to do about threats
Penetration testing
Identify what to do about threats
Hardening
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Vulnerability assessment
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Asset identification
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Threat evaluation
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Vulnerability appraisal
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Risk assessment
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Risk mitigation
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Vulnerability scan
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Penetration testing
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Hardening
Identifying what the pressures are against a company
Vulnerability assessment
Identifying what the pressures are against a company
Asset identification
Identifying what the pressures are against a company
Threat evaluation
Identifying what the pressures are against a company
Vulnerability appraisal
Identifying what the pressures are against a company
Risk assessment
Identifying what the pressures are against a company
Risk mitigation
Identifying what the pressures are against a company
Vulnerability scan
Identifying what the pressures are against a company
Penetration testing
Identifying what the pressures are against a company
Hardening
Identifying how susceptible the current protection is
Vulnerability assessment
Identifying how susceptible the current protection is
Asset identification
Identifying how susceptible the current protection is
Threat evaluation
Identifying how susceptible the current protection is
Vulnerability appraisal
Identifying how susceptible the current protection is
Risk assessment
Identifying how susceptible the current protection is
Risk mitigation
Identifying how susceptible the current protection is
Vulnerability scan
Identifying how susceptible the current protection is
Penetration testing
Identifying how susceptible the current protection is
Hardening
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Vulnerability Assessment and Mitigating Attacks
1
Vulnerability scans are usually performed from outside the security perimeter.
False
2
____ is a comparison of the present state of a system compared to its baseline.

A) Baseline reporting
B) Compliance reporting
C) Baseline assessment
D) Compliance review
A
3
A ____ in effect takes a snapshot of the current security of the organization.

A) threat analysis
B) vulnerability appraisal
C) risk assessment
D) threat assessment
B
4
While the code for a program is being written, it is being analyzed by a ____.

A) black box
B) code review
C) white box
D) scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities.

A) threat scanner
B) vulnerability profiler
C) port scanner
D) application profiler
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
If port 20 is available, then an attacker can assume that FTP is being used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
A ____ outlines the major security considerations for a system and becomes the starting point for solid security.

A) profile
B) threat
C) control
D) baseline
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
A(n) ____ indicates that no process is listening at this port.

A) open port
B) open address
C) closed address
D) closed port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ____ for software is the code that can be executed by unauthorized users.

A) vulnerability surface
B) risk profile
C) input surface
D) attack surface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
A(n) ____ is hardware or software that captures packets to decode and analyze its contents.

A) application analyzer
B) protocol analyzer
C) threat profiler
D) system analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ is the probability that a risk will occur in a particular year.

A) SLE
B) ALE
C) ARO
D) EF
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
The first step in a vulnerability assessment is to determine the assets that need to be protected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
____ is a means by which an organization can transfer the risk to a third party who can demonstrate a higher capability at managing or reducing risks.

A) Insourcing
B) Outsourcing
C) Outcasting
D) Inhousing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
A(n) ____ means that the application or service assigned to that port is listening for any instructions.

A) open port
B) empty port
C) closed port
D) interruptible system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The goal of ____ is to better understand who the attackers are, why they attack, and what types of attacks might occur.

A) threat mitigation
B) threat profiling
C) risk modeling
D) threat modeling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
In an empty box test, the tester has no prior knowledge of the network infrastructure that is being tested.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ is the proportion of an asset's value that is likely to be destroyed by a particular risk.

A) SLE
B) ARO
C) EF
D) ER
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files.

A) port scanner
B) write blocker
C) honeypot
D) honeycomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
The ____ is the expected monetary loss every time a risk occurs.

A) SLE
B) ARO
C) ALE
D) SRE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A healthy security posture results from a sound and workable strategy toward managing risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
A ____ tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications.

A) white box
B) black box
C) replay
D) system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
The end product of a penetration test is the penetration ____.

A) test profile
B) test report
C) test system
D) test view
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Discuss one type of asset that an organization might have.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
____________________ for organizations are intended to identify vulnerabilities and alert network administrators to these problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Most vulnerability scanners maintain a(n) ____________________ that categorizes and describes the vulnerabilities that it can detect.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
List and describe the elements that make up a security posture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
A(n) ____________________ box test is one in which some limited information has been provided to the tester.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
List four things that a vulnerability scanner can do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Describe the purpose of a honeypot.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
A(n) ____________________ scan uses various techniques to avoid detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Describe a penetration testing report.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
A ____ is a network set up with intentional vulnerabilities.

A) honeynet
B) honeypot
C) honeycomb
D) honey hole
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Released in 1995, one of the first tools that was widely used for penetration testing was ____.

A) GOPHER
B) SAINT
C) SATAN
D) NESSUS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
When using a black box test, many testers use ____________________ tricks to learn about the network infrastructure from inside employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
A security weakness is known as a(n) ____.

A) threat
B) vulnerability
C) risk
D) opportunity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
List and describe two common uses for a protocol analyzer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Discuss the purpose of OVAL.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n) ____ examines the current security in a passive method.

A) application scan
B) system scan
C) threat scan
D) vulnerability scan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
List and describe the three categories that TCP/IP divides port numbers into.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
When a security hardware device fails or a program aborts, which state should it go into?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
List two types of hardening techniques.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
An automated software search through a system for any known security weaknesses
Vulnerability assessment
An automated software search through a system for any known security weaknesses
Asset identification
An automated software search through a system for any known security weaknesses
Threat evaluation
An automated software search through a system for any known security weaknesses
Vulnerability appraisal
An automated software search through a system for any known security weaknesses
Risk assessment
An automated software search through a system for any known security weaknesses
Risk mitigation
An automated software search through a system for any known security weaknesses
Vulnerability scan
An automated software search through a system for any known security weaknesses
Penetration testing
An automated software search through a system for any known security weaknesses
Hardening
Identify what damages could result from the threats
Vulnerability assessment
Identify what damages could result from the threats
Asset identification
Identify what damages could result from the threats
Threat evaluation
Identify what damages could result from the threats
Vulnerability appraisal
Identify what damages could result from the threats
Risk assessment
Identify what damages could result from the threats
Risk mitigation
Identify what damages could result from the threats
Vulnerability scan
Identify what damages could result from the threats
Penetration testing
Identify what damages could result from the threats
Hardening
Designed to actually exploit any weaknesses in systems that are vulnerable
Vulnerability assessment
Designed to actually exploit any weaknesses in systems that are vulnerable
Asset identification
Designed to actually exploit any weaknesses in systems that are vulnerable
Threat evaluation
Designed to actually exploit any weaknesses in systems that are vulnerable
Vulnerability appraisal
Designed to actually exploit any weaknesses in systems that are vulnerable
Risk assessment
Designed to actually exploit any weaknesses in systems that are vulnerable
Risk mitigation
Designed to actually exploit any weaknesses in systems that are vulnerable
Vulnerability scan
Designed to actually exploit any weaknesses in systems that are vulnerable
Penetration testing
Designed to actually exploit any weaknesses in systems that are vulnerable
Hardening
Identify what needs to be protected
Vulnerability assessment
Identify what needs to be protected
Asset identification
Identify what needs to be protected
Threat evaluation
Identify what needs to be protected
Vulnerability appraisal
Identify what needs to be protected
Risk assessment
Identify what needs to be protected
Risk mitigation
Identify what needs to be protected
Vulnerability scan
Identify what needs to be protected
Penetration testing
Identify what needs to be protected
Hardening
Eliminating as many security risks as possible and make the system more secure
Vulnerability assessment
Eliminating as many security risks as possible and make the system more secure
Asset identification
Eliminating as many security risks as possible and make the system more secure
Threat evaluation
Eliminating as many security risks as possible and make the system more secure
Vulnerability appraisal
Eliminating as many security risks as possible and make the system more secure
Risk assessment
Eliminating as many security risks as possible and make the system more secure
Risk mitigation
Eliminating as many security risks as possible and make the system more secure
Vulnerability scan
Eliminating as many security risks as possible and make the system more secure
Penetration testing
Eliminating as many security risks as possible and make the system more secure
Hardening
Identify what to do about threats
Vulnerability assessment
Identify what to do about threats
Asset identification
Identify what to do about threats
Threat evaluation
Identify what to do about threats
Vulnerability appraisal
Identify what to do about threats
Risk assessment
Identify what to do about threats
Risk mitigation
Identify what to do about threats
Vulnerability scan
Identify what to do about threats
Penetration testing
Identify what to do about threats
Hardening
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Vulnerability assessment
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Asset identification
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Threat evaluation
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Vulnerability appraisal
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Risk assessment
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Risk mitigation
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Vulnerability scan
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Penetration testing
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Hardening
Identifying what the pressures are against a company
Vulnerability assessment
Identifying what the pressures are against a company
Asset identification
Identifying what the pressures are against a company
Threat evaluation
Identifying what the pressures are against a company
Vulnerability appraisal
Identifying what the pressures are against a company
Risk assessment
Identifying what the pressures are against a company
Risk mitigation
Identifying what the pressures are against a company
Vulnerability scan
Identifying what the pressures are against a company
Penetration testing
Identifying what the pressures are against a company
Hardening
Identifying how susceptible the current protection is
Vulnerability assessment
Identifying how susceptible the current protection is
Asset identification
Identifying how susceptible the current protection is
Threat evaluation
Identifying how susceptible the current protection is
Vulnerability appraisal
Identifying how susceptible the current protection is
Risk assessment
Identifying how susceptible the current protection is
Risk mitigation
Identifying how susceptible the current protection is
Vulnerability scan
Identifying how susceptible the current protection is
Penetration testing
Identifying how susceptible the current protection is
Hardening
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.