Back to AI Flashcard MakerInformation Technology /CompTIA Security+ (SY0-601): Vulnerability Management

CompTIA Security+ (SY0-601): Vulnerability Management

Information Technology14 CardsCreated 8 months ago

This topic covers the structured approaches to identifying and validating system vulnerabilities through vulnerability assessments and penetration testing. It includes key concepts such as defining security baselines, using tools like Metasploit, and understanding attacker techniques like pivoting and maintaining persistence within a compromised environment.

Vulnerability Assessment Methodology

  1. Define the desired state of security

  2. Create a baseline

  3. Prioritize the vulnerabilities

  4. Mitigate vulnerabilities

  5. Monitor the network and systems

Rate to track your progress ✦

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/14

Key Terms

Term
Definition

Vulnerability Assessment Methodology

  1. Define the desired state of security

  2. Create a baseline

Penetration Testing Methodology

Penetration tests look at a network’s vulnerabilities from the outside
Metasploit and CANVAS are commonly used

Penetration Testing: Pivot & Persistence

Pivot:
Occurs when an attacker moves onto another workstation or user account

Persis...

TTX

Tabletop Exercise:
Exercise that uses an incident scenario against a framework of controls or a red team

Pentest Teams

Red Team
The hostile or attacking team in a penetration test or incident response exercise

OVAL

Open Vulnerability & Assessment Language:
A standard designed to regulate the transfer of secure public informati...