1.6 Explain the security concerns associated with various types of vulnerabilities Flashcards
1
Q
Cloud-based vs. on-premises vulnerabilities
A
2
Q
Zero-day
A
3
Q
Weak configurations
-Open permissions
A
4
Q
Weak configurations
-Unsecure root accounts
A
5
Q
Weak configurations
-Errors
A
6
Q
Weak configurations
-Weak encryption
A
7
Q
Weak configurations
-Unsecure protocols
A
8
Q
Weak configurations
-Default settings
A
9
Q
Weak configurations
-Open ports and services
A
10
Q
Third-party risks
-Vendor management/system integration/lack of vendor support
A
11
Q
Third-party risks
-Supply chain
A
12
Q
Third-party risks
-Outsourced code development
A
13
Q
Third-party risks
-Data storage
A
14
Q
Improper or weak patch management
-Firmware
A
15
Q
Improper or weak patch management
-Operating system (OS)
A