11.1 Vulnerability assessment

Ace your homework & exams now with Quizwiz!

Which of the following functions can a port scanner provide? (select two)

1. Determining which ports are open on a firewall 2. Discovering unadvertised servers

You have run a vulnerability scanning tool and identified several patches that need to be applied to a system. What should you do next after applying the patches

Run the vulnerability assessment again

You want to use a tool to scan a system for vulnerabilities including open ports, running services, and missing patches. Which tool would you use? (select two)

1. Nessus 2. Retina

Which of the following are performed by the Microsoft Baseline Security Analyzer (MBSA) tool? (select three)

1. Check user accounts for weak passwords 2. Check for missing patches 3. Check for open ports

You are using a vulnerability scanner that conforms to the OVAL specifications. Which o the following items containing a specific vulnerability or security issue that could be present on a system?

Definition

You want to check a server for user account that have weak password. Which tool should you use?

John the Ripper

You want to identify all devices on a network along with a list of open ports on those devices. You want the results displayed in a graphical diagram. Which tool should you use?

Network Mapper

Which of the following identifies standards and XML formats for reporting and analyzing system vulnerabilities?

OVAL

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?

Port Scanner

Which of the following is the name of the type of port scan which does not complete the full three-way handshake of TCP, but rather listens only for either SYN/ACK or RST/ACK packets?

TCP SYN scan

You want to use a vulnerability scanner to check a system for known security risks. What should you do first?

Up date the scanner definition files

You want to be able to identify the services running on a set of servers on you network. Which tool would best give you the information you need?

Vulnerability Scanner


Related study sets

Chapter 15: Family Assessment and Interventions

View Set

Chapter 20: Family-Centered Palliative Care

View Set

What was Evans Pritchard's major contribution to anthropology ?

View Set

7th Grade Math Vocabulary Epic Charter

View Set

Three main parts of the computer

View Set

Entrepreneurship exam study guide

View Set