Security Assessment
Vulnerability Scoring
Vulnerability Scans
100

This process involves testing and evaluating a system’s security controls.

What is a security assessment?

100

This metric in CVSS measures potential damage caused by a successful exploit.

What is the impact score?

100

This type of scan probes a system without login credentials.

What is a non-credentialed (unauthenticated) vulnerability scan?

200

This program scans a system for known vulnerabilities, such as OpenVAS or Nessus.

What is a vulnerability scanner?

200

This metric measures how easy it is to exploit a vulnerability.

What is the exploitability score?

200

This type of scan uses login access to detect software misconfigurations.

What is a credentialed (authenticated) vulnerability scan?


300

This database assigns identifiers to publicly known cybersecurity vulnerabilities.

What is the Common Vulnerabilities and Exposures (CVE) database?

300

In CVSS, this attack vector means the vulnerability can be exploited remotely.

What is the Network (AV) attack vector?

300

This type of error occurs when a scanner reports a problem that doesn’t exist.

What is a false positive (Type I error)?

M
e
n
u