10. CEH v11: Vulnerability Assessment, Management & Classification

Ace your homework & exams now with Quizwiz!

What are some of the activities that would be done during the pre-assessment phase?

- Gather configurations around the assets - Understand the business and its process

What are two tools that can be used to effectively prioritize or triage vulnerabilities that you may have identified from a vulnerability assessment?

- National Vulnerability Database (NVD) - Common Weakness Enumeration (CWE)

List the Vulnerability Assessment Life Cycle steps in the Post-Assessment Phase

- Risk Assessment - Remediation - Verification - Monitoring

List the steps of Vulnerability Assessment Life Cycle in order, starting with Creating

1. Create a Baseline 2. Vulnerability Assessment 3. Risk Assessment 4. Remediation 5. Verification 6. Monitoring

List the Vulnerability Assessment Life Cycle steps in the Pre-Assessment Phase

Creating a Baseline

What is the rating scale used by CVSS Version 3.0 to rate vulnerabilities against their CVSS score?

Low = 0.1-3.9 Medium = 4.0-6.9 High = 7.0-8.9 Critical = 9.0-10.0

What vulnerability type could show up on a vulnerability scan when an administrator adds a network application and opens a port in the firewall for temporary access and then does not remove the temporary access from the firewall after it was no longer needed?

Open Services

Application Flaws

Perform code reviews and use Secure Development Life Cycle (SDLC) to prevent

Misconfiguration

Set the wrong permissions and give users access to systems they shouldn't be able to access

OS Flaws

Shell Shock and SMB Ghost are examples of this vulnerability

Buffer Overflow

Use fuzzing software against applications to find these vulnerabilities

What vulnerability type would represent a situation where an admin installed a new network firewall device and leaves it factory configured?

Using defaults

List the Vulnerability Assessment Life Cycle steps in the Vulnerability Assessment Phase

Vulnerability Assessment


Related study sets

Chapter 8 - Hardware Support A+, Chapter 7, Software Support A+

View Set

VOLUME 5 Chapter 6: Abuse, Neglect, and Assault

View Set

Lecture 22 - Free radicals and antioxidants

View Set

Diarios de Motocicleta: Cultural Notes

View Set

302 Hinkle Chapter 20: Assessment of Respiratory Function PrepU

View Set