Deck 5: Scanning for Vulnerabilities

ملء الشاشة (f)
exit full mode
سؤال
A vulnerability scan is a single event using a manual process that is too often performed only to comply with regulatory requirements.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following describes a collection of requirements specific to a system or procedure that must be met by everyone?

A) Policy
B) Standard
C) Framework
D) Guideline
سؤال
Which of the following describes a vulnerability scan?

A) It identifies deep vulnerabilities.
B) It uses external third parties to conduct the scan.
C) It uses a primarily automated process.
D) It aims to gain unauthorized access.
سؤال
An organization's tolerance for exposure to a vulnerability is called its _____________.
سؤال
Name a product that is a well-known vulnerability scanner.
سؤال
Which of the following is a full-featured vulnerability scanner that includes over 50,000 vulnerability tests?

A) Metasploit
B) Scantron
C) OpenVAS
D) GNU GPL
سؤال
What are module updates that can be downloaded and installed as needed?
سؤال
Which of the following is not a vulnerability feed?

A) Department of Defense Database of Vulnerabilities (DoD-DV)
B) NIST National Vulnerability Database (NVD)
C) Mitre Common Vulnerabilities and Exposures (CVE)
D) VulnDB
سؤال
When you are actively seeking information on the Internet, such as an answer to a question, are you using a "pull" method or a "push" method?
سؤال
Which of the following demonstrates a "convergence of will" between the parties so that they can work together, but is not generally considered a legally enforceable agreement?

A) Service level agreement
B) Memorandum of understanding
C) Interconnection security agreement
D) Non-disclosure agreement (NDA)
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Scanning for Vulnerabilities
1
A vulnerability scan is a single event using a manual process that is too often performed only to comply with regulatory requirements.
False
2
Which of the following describes a collection of requirements specific to a system or procedure that must be met by everyone?

A) Policy
B) Standard
C) Framework
D) Guideline
Standard
3
Which of the following describes a vulnerability scan?

A) It identifies deep vulnerabilities.
B) It uses external third parties to conduct the scan.
C) It uses a primarily automated process.
D) It aims to gain unauthorized access.
It uses a primarily automated process.
4
An organization's tolerance for exposure to a vulnerability is called its _____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
Name a product that is a well-known vulnerability scanner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is a full-featured vulnerability scanner that includes over 50,000 vulnerability tests?

A) Metasploit
B) Scantron
C) OpenVAS
D) GNU GPL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
What are module updates that can be downloaded and installed as needed?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is not a vulnerability feed?

A) Department of Defense Database of Vulnerabilities (DoD-DV)
B) NIST National Vulnerability Database (NVD)
C) Mitre Common Vulnerabilities and Exposures (CVE)
D) VulnDB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
When you are actively seeking information on the Internet, such as an answer to a question, are you using a "pull" method or a "push" method?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following demonstrates a "convergence of will" between the parties so that they can work together, but is not generally considered a legally enforceable agreement?

A) Service level agreement
B) Memorandum of understanding
C) Interconnection security agreement
D) Non-disclosure agreement (NDA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.