Deck 13: Vulnerability Assessment and Data Security

ملء الشاشة (f)
exit full mode
سؤال
Each packet/datagram contains a source port and destination port.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is the name of the process that basically takes a snapshot of the current security of an organization?

A)threat analysis
B)vulnerability appraisal
C)risk assessment
D)threat assessment
سؤال
A port in what state below implies that an application or service assigned to that port is listening for any instructions?

A)open port
B)empty port
C)closed port
D)interruptible system
سؤال
Realistically,risks can never be entirely eliminated.
سؤال
What is another term used for a security weakness?

A)threat
B)vulnerability
C)risk
D)opportunity
سؤال
Vulnerability scanning should be conducted on existing systems and particularly as new technology equipment is deployed.
سؤال
An administrator running a port scan wants to ensure that no processes are listening on port 23.What state should the port be in?

A)open port
B)secure port
C)hardened port
D)closed port
سؤال
The second step in a vulnerability assessment is to determine the assets that need to be protected.
سؤال
An administrator needs to view packets and decode and analyze their contents.What type of application should the administrator use?

A)application analyzer
B)protocol analyzer
C)threat profiler
D)system analyzer
سؤال
A risk management assessment is a systematic and methodical evaluation of the security posture of the enterprise.
سؤال
During a vulnerability assessment,what type of software can be used to search a system for port vulnerabilities?

A)threat scanner
B)vulnerability profiler
C)port scanner
D)application profiler
سؤال
Which is the term for a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic,yet they are imitations of real data files?

A)port scanner
B)honeynet
C)honeypot
D)honeycomb
سؤال
TCP/IP uses a numeric value as an identifier to the applications and services on these systems.
سؤال
What is the term for a network set up with intentional vulnerabilities?

A)honeynet
B)honeypot
C)honeycomb
D)honey hole
سؤال
Which item below is the standard security checklist against which systems are evaluated for a security posture?

A)profile
B)threat
C)control
D)baseline
سؤال
Determining vulnerabilities often depends on the background and experience of the assessor.
سؤال
The goal of what type of threat evaluation is to better understand who the attackers are,why they attack,and what types of attacks might occur?

A)threat mitigation
B)threat profiling
C)risk modeling
D)threat modeling
سؤال
Netstat displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP)and DNS settings.
سؤال
Nslookup displays detailed information about how a device is communicating with other network devices.
سؤال
In white box and gray box testing,the first task of the tester is to perform preliminary information gathering on their own from outside the organization,sometimes called open source intelligence (OSINT).
سؤال
What type of reconnaissance is a penetration tester performing if they are using tools that do not raise any alarms?

A)active
B)passive
C)invasive
D)evasive
سؤال
If a user uses the operating system's "delete" command to erase data,what type of data removal procedure was used?

A)wiping
B)purging
C)degaussing
D)data sanitation
سؤال
Which of the following is used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools?

A)replication image
B)assessment image
C)penetration framework
D)exploitation framework
سؤال
Which scan examines the current security,using a passive method?

A)application scan
B)system scan
C)threat scan
D)vulnerability scan
سؤال
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound traffic?

A)application search
B)application control
C)firewall monitoring
D)virus control
سؤال
Which of the following is the goal of a vulnerability scan? (Choose all that apply. )

A)identify vulnerabilities
B)identify common misconfigurations
C)identify threat actors
D)identify a lack of security controls
سؤال
What type of scanner sends "probes" to network devices and examine the responses received back to evaluate whether a specific device needs remediation?

A)active
B)non-intrusive
C)passive
D)intrusive
سؤال
What term is defined as the state or condition of being free from public attention to the degree that you determine?

A)freedom
B)secure
C)privacy
D)contentment
سؤال
What security goal do the following common controls address: hashing,digital signatures,certificates,nonrepudiation tools?

A)confidentiality
B)integrity
C)availability
D)safety
سؤال
If a penetration tester has gained access to a network and then tries to move around inside the network to other resources,what procedure is the tester performing?

A)pivot
B)spinning
C)persistence
D)secondary exploitation
سؤال
What type of penetration testing technique is used if the tester has no prior knowledge of the network infrastructure that is being tested?

A)white box
B)gray box
C)black box
D)sealed box
سؤال
Which of the following is a valid data sensitivity labeling and handling category? (Choose all that apply. )

A)high-risk
B)confidential
C)personal health information
D)proprietary
سؤال
Select the vulnerability scan type that will use only the available information to hypothesize the status of the vulnerability.

A)active
B)non-intrusive
C)passive
D)intrusive
سؤال
Which of the following groups categorize the risks associated with the use of private data? (Choose all that apply. )

A)Statistical inferences.
B)Associations with groups.
C)Private and consumer data
D)Individual inconveniences and identity theft.
سؤال
Which tester has an in-depth knowledge of the network and systems being tested,including network diagrams,IP addresses,and even the source code of custom applications?

A)white box
B)black box
C)replay
D)system
سؤال
What is the end result of a penetration test?

A)penetration test profile
B)penetration test report
C)penetration test system
D)penetration test view
سؤال
What security goal do the following common controls address: Redundancy,fault tolerance,and patching.?

A)confidentiality
B)integrity
C)availability
D)safety
سؤال
Which data erasing method will permanently destroy a magnetic-based hard disk by reducing or eliminating the magnetic field?

A)wiping
B)purging
C)degaussing
D)data sanitation
سؤال
What process does a penetration tester rely on to access an ever higher level of resources?

A)pivot
B)spinning
C)persistence
D)continuous exploitation
سؤال
What process addresses how long data must be kept and how it is to be secured?

A)legal retention
B)data retention
C)legal and compliance
D)data methodology
سؤال
Explain the concepts of personal data theft and identity theft.
سؤال
List and describe the elements that make up a security posture.
سؤال
List and describe two common uses for a protocol analyzer.
سؤال
List and describe the three categories that TCP/IP divides port numbers into.
سؤال
List two types of hardening techniques.
سؤال
List at least four things that a vulnerability scanner can do.
سؤال
Describe a penetration testing report.
سؤال
Describe the purpose of a honeypot.
سؤال
When a security hardware device fails or a program aborts,which state should it go into?
سؤال
Discuss one type of asset that an organization might have.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Vulnerability Assessment and Data Security
1
Each packet/datagram contains a source port and destination port.
True
2
What is the name of the process that basically takes a snapshot of the current security of an organization?

A)threat analysis
B)vulnerability appraisal
C)risk assessment
D)threat assessment
B
3
A port in what state below implies that an application or service assigned to that port is listening for any instructions?

A)open port
B)empty port
C)closed port
D)interruptible system
A
4
Realistically,risks can never be entirely eliminated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is another term used for a security weakness?

A)threat
B)vulnerability
C)risk
D)opportunity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Vulnerability scanning should be conducted on existing systems and particularly as new technology equipment is deployed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
An administrator running a port scan wants to ensure that no processes are listening on port 23.What state should the port be in?

A)open port
B)secure port
C)hardened port
D)closed port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The second step in a vulnerability assessment is to determine the assets that need to be protected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
An administrator needs to view packets and decode and analyze their contents.What type of application should the administrator use?

A)application analyzer
B)protocol analyzer
C)threat profiler
D)system analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
A risk management assessment is a systematic and methodical evaluation of the security posture of the enterprise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
During a vulnerability assessment,what type of software can be used to search a system for port vulnerabilities?

A)threat scanner
B)vulnerability profiler
C)port scanner
D)application profiler
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which is the term for a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic,yet they are imitations of real data files?

A)port scanner
B)honeynet
C)honeypot
D)honeycomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
TCP/IP uses a numeric value as an identifier to the applications and services on these systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
What is the term for a network set up with intentional vulnerabilities?

A)honeynet
B)honeypot
C)honeycomb
D)honey hole
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which item below is the standard security checklist against which systems are evaluated for a security posture?

A)profile
B)threat
C)control
D)baseline
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Determining vulnerabilities often depends on the background and experience of the assessor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
The goal of what type of threat evaluation is to better understand who the attackers are,why they attack,and what types of attacks might occur?

A)threat mitigation
B)threat profiling
C)risk modeling
D)threat modeling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Netstat displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP)and DNS settings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Nslookup displays detailed information about how a device is communicating with other network devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
In white box and gray box testing,the first task of the tester is to perform preliminary information gathering on their own from outside the organization,sometimes called open source intelligence (OSINT).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
What type of reconnaissance is a penetration tester performing if they are using tools that do not raise any alarms?

A)active
B)passive
C)invasive
D)evasive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
If a user uses the operating system's "delete" command to erase data,what type of data removal procedure was used?

A)wiping
B)purging
C)degaussing
D)data sanitation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following is used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools?

A)replication image
B)assessment image
C)penetration framework
D)exploitation framework
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which scan examines the current security,using a passive method?

A)application scan
B)system scan
C)threat scan
D)vulnerability scan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound traffic?

A)application search
B)application control
C)firewall monitoring
D)virus control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is the goal of a vulnerability scan? (Choose all that apply. )

A)identify vulnerabilities
B)identify common misconfigurations
C)identify threat actors
D)identify a lack of security controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
What type of scanner sends "probes" to network devices and examine the responses received back to evaluate whether a specific device needs remediation?

A)active
B)non-intrusive
C)passive
D)intrusive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What term is defined as the state or condition of being free from public attention to the degree that you determine?

A)freedom
B)secure
C)privacy
D)contentment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What security goal do the following common controls address: hashing,digital signatures,certificates,nonrepudiation tools?

A)confidentiality
B)integrity
C)availability
D)safety
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
If a penetration tester has gained access to a network and then tries to move around inside the network to other resources,what procedure is the tester performing?

A)pivot
B)spinning
C)persistence
D)secondary exploitation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
What type of penetration testing technique is used if the tester has no prior knowledge of the network infrastructure that is being tested?

A)white box
B)gray box
C)black box
D)sealed box
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is a valid data sensitivity labeling and handling category? (Choose all that apply. )

A)high-risk
B)confidential
C)personal health information
D)proprietary
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Select the vulnerability scan type that will use only the available information to hypothesize the status of the vulnerability.

A)active
B)non-intrusive
C)passive
D)intrusive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following groups categorize the risks associated with the use of private data? (Choose all that apply. )

A)Statistical inferences.
B)Associations with groups.
C)Private and consumer data
D)Individual inconveniences and identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which tester has an in-depth knowledge of the network and systems being tested,including network diagrams,IP addresses,and even the source code of custom applications?

A)white box
B)black box
C)replay
D)system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is the end result of a penetration test?

A)penetration test profile
B)penetration test report
C)penetration test system
D)penetration test view
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
What security goal do the following common controls address: Redundancy,fault tolerance,and patching.?

A)confidentiality
B)integrity
C)availability
D)safety
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which data erasing method will permanently destroy a magnetic-based hard disk by reducing or eliminating the magnetic field?

A)wiping
B)purging
C)degaussing
D)data sanitation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What process does a penetration tester rely on to access an ever higher level of resources?

A)pivot
B)spinning
C)persistence
D)continuous exploitation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
What process addresses how long data must be kept and how it is to be secured?

A)legal retention
B)data retention
C)legal and compliance
D)data methodology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Explain the concepts of personal data theft and identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
List and describe the elements that make up a security posture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
List and describe two common uses for a protocol analyzer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
List and describe the three categories that TCP/IP divides port numbers into.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
List two types of hardening techniques.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
List at least four things that a vulnerability scanner can do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe a penetration testing report.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe the purpose of a honeypot.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
When a security hardware device fails or a program aborts,which state should it go into?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Discuss one type of asset that an organization might have.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.