CPQ – Chapter 15 – Flashcards
Unlock all answers in this set
Unlock answersquestion
____________________ for organizations are intended to identify vulnerabilities and alert network administrators to these problems.
answer
Vulnerability scanners
question
Most vulnerability scanners maintain a(n) ____________________ that categorizes and describes the vulnerabilities that it can detect.
answer
database
question
When using a black box test, many testers use ____________________ tricks to learn about the network infrastructure from inside employees.
answer
social engineering
question
A(n) ____________________ box test is one in which some limited information has been provided to the tester.
answer
gray
question
In a __________ test, the tester has no prior knowledge of the network infrastructure that is being tested.
answer
black box
question
The first step in a vulnerability assessment is to determine the assets that need to be protected.
answer
True
question
If TCP port 20 is open, then an attacker can assume that FTP is being used.
answer
True
question
Vulnerability scans are usually performed from outside the security perimeter.
answer
False
question
A healthy security posture results from a sound and workable strategy toward managing risks.
answer
True
question
During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?
a. port scanner
b. vulnerability profiler
c. threat scanner
d. application profiler
answer
a. port scanner