1.2 Attacking and Defending Flashcards

1
Q

threat assessment

A

structured process of identifying the threats posed to a group or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

risk mitigation

A

the systematic reduction of the impact and likely occurrence of a negative event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why mitigation and not eradication?

A

we cannot eradicate all risks. Cybersec is ever evolving, new threats emerge every day.
-business needs and budgetary constraints limit the ability to implement cybersecurity best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

attack

A

any kind of malicious activity that attempts to collect, disrupt, deny, degrade , or destroy information system resources of the information itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

physical machines

A

desktop or laptop; also known as bare metal machines; physical computers that have hardware components
-can run multiple virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

virtual machine

A

an application that acts like a completely different physical machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

advantages of a virtual machine

A

easy and inexpensive (often free) to set up and run
can be easily distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

advantage of a physical machine

A

typically more efficient b/c they access the hardware components directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ubuntu VM

A

a type of virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

virtual box

A

a virtualization tool used to run various various operating systems on our local machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vagrant

A

tool used to build and set up virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly