Questions
Here are a few questions to test your understanding of the chapter:
- When performing a SCAP scan on a system, which of the following types of scans will be most useful?
- Credentialed
- Non-credentialed
- Agent-based
- Intrusive
- What would be most important when monitoring security on ICS networks, where latency must be minimized?
- Group Policy
- Active scanning
- Passive scanning
- Continuous integration
- What is the protocol that allows for the automation of security compliance scans?
- SCAP
- CVSS
- CVE
- ARF
- What standard would support the creation of XML-format configuration templates?
- XCCDF
- CVE
- CPE
- NMAP
- What standard allows a vulnerability scanner to detect the host operating system and installed applications?
- XCCDF
- CVE
- CPE
- SCAP
- What standard supports a common reporting standard for vulnerability scanning?
- XCCDF
- CVE
- OVAL
- STIG
- What information type can be found at MITRE and NIST NVD that describes a known vulnerability and gives information regarding remediation?
- CVE
- CPE
- CVSS
- OVAL
...