Chapter 29 Quiz: Vulnerability Management¶
Test your knowledge of the vulnerability lifecycle, CVSS scoring, exploit prediction, scanning tooling, and risk-based prioritization strategies.
Questions¶
1. A newly published CVE scores 9.8 CVSS v3 Base Score but has an EPSS score of 0.003 (0.3%). How should a risk-based vulnerability management program treat this finding?
- A) Patch immediately — CVSS 9.8 always requires emergency remediation within 24 hours
- B) Consider the low EPSS score; the vulnerability is theoretically severe but has very low observed exploitation probability, allowing a risk-adjusted timeline
- C) Ignore it since the EPSS score is below 1%
- D) Escalate to the board since any CVSS above 9.0 is an executive-level risk
Answer
B — Consider the low EPSS score; the vulnerability is theoretically severe but has very low observed exploitation probability, allowing a risk-adjusted timeline
CVSS measures theoretical severity based on attack vector, complexity, and impact — not real-world exploitation likelihood. EPSS (Exploit Prediction Scoring System) provides a probability estimate of exploitation in the wild within 30 days. A high CVSS + low EPSS vulnerability may be deprioritized relative to a lower CVSS + high EPSS vulnerability actively being exploited. Risk-based programs combine both signals.
2. What is the correct sequence of the vulnerability management lifecycle?
- A) Scan → Triage → Remediate → Verify → Report
- B) Discover → Triage → Remediate → Verify → Report
- C) Patch → Scan → Verify → Triage → Report
- D) Triage → Discover → Patch → Report → Verify
Answer
B — Discover → Triage → Remediate → Verify → Report
The standard vulnerability lifecycle is: Discover (identify assets and vulnerabilities via scanning/intelligence), Triage (assess severity, exploitability, and business context), Remediate (patch, mitigate, or accept with compensating control), Verify (rescan/retest to confirm closure), Report (communicate metrics and status to stakeholders). Scanning is part of Discovery.
3. A CVSS v3 Base Score of 7.5 is modified to 9.1 after applying the Environmental Score. What most likely caused this increase?
- A) A patch was released, raising the Temporal Score
- B) The affected asset is classified as a critical business system with high Confidentiality, Integrity, and Availability requirements
- C) The threat actor group was identified as nation-state, raising the exploitability
- D) The vulnerability was added to the CISA KEV catalog
Answer
B — The affected asset is classified as a critical business system with high Confidentiality, Integrity, and Availability requirements
The CVSS v3 Environmental Score allows organizations to adjust the base score based on the target asset's Modified Impact Metrics — specifically the Confidentiality, Integrity, and Availability (CIA) requirements of that asset in the organization's context. Critical assets with high CIA requirements will amplify the environmental score above the base. Temporal scores reflect vulnerability maturity and patch availability, not asset criticality.
4. Your organization's VM SLA policy requires critical vulnerabilities (CVSS ≥ 9.0) to be remediated within 15 days, but a legacy manufacturing system cannot be patched without a 6-month maintenance window. What is the appropriate VM response?
- A) Waive the SLA permanently since patching is not possible
- B) Document a risk acceptance with compensating controls (network isolation, IDS signatures, enhanced monitoring) and set a formal exception with expiration date
- C) Decommission the system immediately to meet the SLA
- D) Change the system's criticality classification to reduce the applicable SLA
Answer
B — Document a risk acceptance with compensating controls (network isolation, IDS signatures, enhanced monitoring) and set a formal exception with expiration date
When a patch cannot be applied within SLA, the VM program should require a formal exception with: documented business justification, risk acceptance by an appropriate owner, compensating controls to reduce exposure, and an expiration date that forces re-evaluation. Risk acceptance is not the same as ignoring the vulnerability. Downgrading the criticality classification (D) manipulates metrics rather than managing risk.
5. Which vulnerability scanning tool is known for its Nessus engine, is widely used in enterprise VM programs, and is available in both commercial and free (Essentials) versions?
- A) OpenVAS
- B) Qualys
- C) Tenable Nessus
- D) Nexpose
Answer
C — Tenable Nessus
Tenable Nessus is the leading vulnerability scanner built on the Nessus engine, available as Nessus Professional (commercial) and Nessus Essentials (free, limited to 16 IPs). OpenVAS is the open-source fork of the original Nessus codebase now maintained by Greenbone. Qualys is a separate cloud-based VM platform. Nexpose is Rapid7's scanner.
6. What is the difference between CVE, CWE, and CPE in the context of vulnerability management?
- A) CVE identifies specific vulnerabilities; CWE classifies weakness types; CPE identifies affected software/hardware configurations
- B) CVE is for network vulnerabilities; CWE is for application vulnerabilities; CPE is for cloud vulnerabilities
- C) CVE, CWE, and CPE are all formats for the same CVSS scoring system
- D) CWE replaces CVE in modern VM programs; CPE is a deprecated standard
Answer
A — CVE identifies specific vulnerabilities; CWE classifies weakness types; CPE identifies affected software/hardware configurations
CVE (Common Vulnerabilities and Exposures): a unique identifier for a specific publicly known vulnerability (e.g., CVE-2021-44228 — Log4Shell). CWE (Common Weakness Enumeration): a category system for types of software weaknesses (e.g., CWE-79 — XSS, CWE-89 — SQL Injection). CPE (Common Platform Enumeration): a standardized naming scheme for software, hardware, and OS configurations used to match vulnerabilities to affected assets.
7. An analyst is reviewing scan results and finds 2,400 vulnerabilities across 600 assets. The organization has a team of 3 engineers. What risk-based prioritization approach should be applied first?
- A) Patch all vulnerabilities alphabetically by CVE ID
- B) Focus on vulnerabilities in the CISA Known Exploited Vulnerabilities (KEV) catalog and those with EPSS > 0.5 on internet-facing critical assets
- C) Begin patching all CVSS 4.0–6.9 findings since critical patches usually require change windows
- D) Submit a request to expand the team before prioritizing anything
Answer
B — Focus on vulnerabilities in the CISA Known Exploited Vulnerabilities (KEV) catalog and those with EPSS > 0.5 on internet-facing critical assets
With limited resources, risk-based prioritization requires triaging by: active exploitation evidence (CISA KEV), exploitation probability (EPSS), asset exposure (internet-facing), and business criticality. CISA BOD 22-01 mandates KEV remediation for federal agencies, but KEV is widely adopted as a prioritization signal. Starting with medium-severity (B) is a common trap — high-probability exploits in lower CVSS findings often pose greater real-world risk.
8. A scan shows a critical vulnerability on a host, but the security team knows this is a false positive due to the version string not reflecting the actual patched build. What is the correct VM process step?
- A) Delete the finding from the scanner to clean up the dashboard
- B) Document the false positive finding, mark it as an exception with justification, and verify the patch status through alternative means (e.g., package manager query)
- C) Accept the finding as valid and patch again to be safe
- D) Suppress all future scans against that host to prevent recurrence
Answer
B — Document the false positive finding, mark it as an exception with justification, and verify the patch status through alternative means (e.g., package manager query)
False positives must be formally documented with evidence and justification, not simply deleted. The scanner's exception/suppression workflow maintains an audit trail. Independent verification of patch status (e.g., querying the OS package manager) provides assurance that the patch is genuinely applied, protecting against actual misclassification.
9. What is the primary purpose of an asset inventory in a vulnerability management program?
- A) Asset inventory is used exclusively for software licensing compliance
- B) Complete and accurate asset inventory ensures no assets are missed during scanning — unknown assets cannot be patched
- C) Asset inventory is used to generate CVSS environmental scores automatically
- D) Asset inventory satisfies the Temporal Score metric in CVSS v3
Answer
B — Complete and accurate asset inventory ensures no assets are missed during scanning — unknown assets cannot be patched
VM programs are only as effective as their asset visibility. Assets not in inventory are not scanned; unscanned assets are unpatched; unpatched assets are attack surface. Asset inventory is the foundational dependency of VM: you cannot manage what you cannot see. This is often cited as the top VM program failure point.
10. After a vulnerability is remediated, a follow-up scan confirms the finding is no longer detected. Which vulnerability lifecycle phase does this represent, and why is it mandatory?
- A) Discovery — re-scanning refreshes the vulnerability database
- B) Verification — independently confirms that remediation was effective rather than relying on the change team's self-report
- C) Reporting — the rescan generates the closure metric for the SLA dashboard
- D) Triage — re-evaluating severity after patching to confirm CVSS score changes
Answer
B — Verification — independently confirms that remediation was effective rather than relying on the change team's self-report
Verification is the post-remediation rescan that independently confirms the vulnerability is closed. It is mandatory because: patches may be applied incorrectly, applied to the wrong host, or a different version may still be vulnerable. Self-reported closure by the patching team is not sufficient in a rigorous VM program. Verification provides the audit evidence that the SLA was met.
Scoring¶
| Score | Performance |
|---|---|
| 9–10 | Expert — Vulnerability management lifecycle and risk-based prioritization fully mastered |
| 7–8 | Proficient — Ready to operate and lead a VM program |
| 5–6 | Developing — Review Chapter 29 sections on CVSS/EPSS scoring and prioritization frameworks |
| <5 | Foundational — Re-read Chapter 29 before proceeding |
Return to Chapter 29 | Next: Chapter 30