100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Vulnerability Management EXAM 1 with complete answers

Rating
-
Sold
-
Pages
35
Grade
A+
Uploaded on
24-11-2024
Written in
2024/2025

Vulnerability Management EXAM 1 Terms in this set (186) Original What is a Risk? a function of THREATS and VULNERABILITIES on a per "asset" basis What is the Risk formula? Risk = Threats + Vulnerabilities - Safeguards What are the 3 main threat sources? - Structural Failures (like a leaking pipe in a building that floods a server room, or a fire resulting of an electrical problem) - Environmental Disasters (like an earthquake, tornado, hurricane, etc.) - People (outsiders or insiders) What is a vulnerability? an inherent weakness What is Vulnerability Management? the practice of FINDING and MI

Show more Read less
Institution
Vulnerability Management Foundation
Course
Vulnerability Management Foundation











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Vulnerability Management Foundation
Course
Vulnerability Management Foundation

Document information

Uploaded on
November 24, 2024
Number of pages
35
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Vulnerability Management EXAM 1
Terms in this set (186)


Original
What is a Risk?
a function of THREATS and VULNERABILITIES on a per "asset" basis



What is the Risk formula?
Risk = Threats + Vulnerabilities - Safeguards



What are the 3 main threat sources?
- Structural Failures (like a leaking pipe in a building that floods a server
room, or a fire resulting of an electrical problem)
- Environmental Disasters (like an earthquake, tornado, hurricane, etc.)
- People (outsiders or insiders)



What is a vulnerability?
an inherent weakness



What is Vulnerability Management?
the practice of FINDING and MITIGATING the vulnerabilities in
computers and networks

,True or False? VULNERABILITY MANAGEMENT comes down to whether
you want to remove the vulnerability (fix the problem), or apply a
safeguard(s) to offset the risk.
True



3 Ways to find vulnerabilities:
- ASSESS, AUDIT, or TEST
- MONITOR CONFIGURATIONS and CHANGE to determine what
vulnerabilities may be unintentionally created
- ANALYZE POTENTIAL ATTACKS which discloses vulnerabilities that
cannot be easily seen



What is an Assessment?
A SUBJECTIVE EVALUATION by a human to aid in the
DESIGN/RE-DESIGN of safeguards and can actually IMPACT what the
standards are



How does the proof work in Assessments?
ATTESTATIONS (i.e. declarations of evidence or proof) are solicited
(meaning you are just asking a person, not actually checking yourself) and
documented



What are the 3 main pros to Assessments?
- less INVASIVE and EXPENSIVE to complete than an audit
- less TEDIOUS than an audit
- drives DESIGN and ARCHITECTURE instead of validation of configuration

,What is an Audit?
An OBJECTIVE EVALUATION by a human to determine if the
CONFIGURATION of safeguards is in alignment with a DOCUMENTED
STANDARD (purely checking to see if the organizational/industry standards
(e.g. PCI DSS) are being followed).



How does proof work in Audits?
EVIDENCE of configuration is solicited and DOCUMENTED (meaning you
need to actually SEE THE PROOF via screenshots or something)



What are some reference standards used in audits?
ORGANIZATIONAL policies, procedures, & standards and/or INDUSTRY
standards (e.g. PCI DSS)



What are the 2 pros to Audits?
- uncovers INITIAL IMPLEMENTATIONS or changes that are not in
ALIGNMENT with standards
- provides ASSURANCE to others



What is the main con to Audits?
the standard may not be SPECIFIC enough or may be DATED in content, and
thus only determines COMPLIANCE with the standard and does not DETECT
RISK



What is a Vulnerability Scan?

, a TECHNICAL EVALUATION to determine if the configuration of
safeguards is in ALIGNMENT with a DOCUMENTED STANDARD (lets
TECHNOLOGY/SOFTWARE do the work for us)



How does proof work in a Vulnerability Scan?
EVIDENCE of configuration is TECHNICALLY EXTRACTED, one system at a
time and documented. Based on vendor or public provided verification points.



What are some things you might be looking for in a vulnerability scan?
- PRESENCE of a specific FILE VERSION or REGISTRY VALUE
- MISSING files or registry values
- RESPONSES from querying specific PORTS



What does the Common Vulnerability Scoring System (CVSS) attempt to do?
attempts to ASSIGN SEVERITY SCORES to misconfigurations (aka
VULNERABILITIES) to enable PRIORITIZED remediation



National Vulnerability Database (NVD)
A superset of the CVE database maintained by NIST, that provides the
world with a list of Common Vulnerabilities and Exposures (CVEs) in
operating systems and software applications



True or False? Unauthenticated scans CANNOT see all vulnerabilities, but
many penetration testers often prefer them because it more closely
simulates a true attacker.
True

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AnswersCOM Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
1197
Member since
2 year
Number of followers
354
Documents
26602
Last sold
1 day ago
Academic Guru

In my profile, you'll find a range of study resources, including detailed lecture notes, comprehensive summaries, and challenging practice exams. These materials are designed to help you grasp key concepts, review efficiently, and perform your best during assessments.I'm here not just to share but also to learn. Feel free to connect, ask questions, and share your insights. Together, we can make the learning journey more enriching. Browse through my materials, and I hope you find them beneficial for your academic success. Happy studying!

Read more Read less
3.6

222 reviews

5
97
4
24
3
46
2
15
1
40

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions