1.6 Explain the security concerns associated with various types of vulnerabilities Flashcards

1
Q

Cloud-based vs. on-premises vulnerabilities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zero-day

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Weak configurations
-Open permissions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Weak configurations
-Unsecure root accounts

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Weak configurations
-Errors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Weak configurations
-Weak encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Weak configurations
-Unsecure protocols

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Weak configurations
-Default settings

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Weak configurations
-Open ports and services

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Third-party risks
-Vendor management/system integration/lack of vendor support

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Third-party risks
-Supply chain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Third-party risks
-Outsourced code development

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Third-party risks
-Data storage

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Improper or weak patch management
-Firmware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Improper or weak patch management
-Operating system (OS)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Improper or weak patch management
-Applications

A
17
Q

Legacy platforms

A
18
Q

Impacts
-Data loss

A
19
Q

Impacts
-Data breaches

A
20
Q

Impacts
-Data exfiltration

A
21
Q

Impacts
-ID theft

A
22
Q

Impacts
-Financial

A
23
Q

Impacts
-Reputation

A