1.6 Understanding Vulnerability Types Flashcards

1
Q

Data breaches violate which principle of cybersecurity?

  • Integrity
  • Availability
  • Non-Repudiation
  • Confidentiality
A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which one of the following issues is not generally associated with the use of default configurations?

  • Extraneous Services Running
  • SQL injection flaws
  • Open Ports
  • Vendor-assigned passwords
A

SQL injection flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is generally a bad practice to run software after the vendor’s end of life.

  • False
  • True
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly