• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back

One of the main vulnerability scanners used across multiple platforms including Windows, Linux, Smartphones. Determines Hosts Operating System & Service Packs Assists with Patch Management.

GFI LANguard

Vulnerability Scanner that provides patch, configuration, auditing, malware, botnet discovery, easily deployed in Amazon Web Services AWS Cloud. Uses Client Server Architecture

Nessus

Vulnerability Scanner available as a stand alone application or enterprise suite of services. Used to locate and report system vulnerabilities and has feature reduced free version.

Retina

Network Security Vulnerability Scanning tool

IBM ISS Internet Scanner

Vulnerability Scanner for MAC System

X-Scan

3rd Generation Resource Analysis Tool that has been available for over 10 years - Integrates with National Vulnerability Database

Security Auditors Research Assistant (SARA)

Find and track vulnerabilities in perimeter devices - can predict impact of zero day attacks

QualysGuard

Can detect and fix vulnerabilities before they can be attacked by intruders. Can perform configuration audits defined by FDCC and DISA

SAINT

Microsoft Security Analyzer. Used to Scan Products to determine compliance with Microsoft Security Guidelines.

Microsoft Baseline Security Analyzer (MBSA)

Type of Vulnerability Assessment that does not directly attack a system but looks for configuration settings and patch

Passive Vulnerability Assessment

Type of Vulnerability Assessment that directly communicates with the network infrastructure and can trigger alerts in the system

Active Vulnerability Assessment

Exploitation tool - most comprehensive commercial penetration testing product available - end user security training

CORE

Comprehensive framework for security testers worldwide.

CANVAS

Open Source Vulnerability Scanner

Metasploit

Designed to lure, not trap, malicious users away from production environnment. Can simulate servers and users. Can be placed inside firewall, DMZ.

Honeypot

Entire network designed to attract attackers away from production environments. Networks made up of Firewalls, FTP Servers, Mission Critical Applications.

Honeynet

Three types of System Events

Information


Warning


Error