1.6 Various types of vulnerabilities Flashcards

1
Q

zero-day

A

Attacks that exploit known vulnerabilities. These are dangerous because they are unknown to product vendors, and no patches are available to correct them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Weak configurations

A

These are weak settings that may jeopardize security.
1. The use of default settings that pose a security risk
2. The presence of unsecured accounts
3. Open ports and services that are not necessary to support normal system operations.
4. Open permissions that allow users access that violates the principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

open permissions

A

These allow users access that violates the principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

unsecure root accounts

A

This is an account with admin privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

weak encryption

A

A weak encryption may be easily defeated by an attacker. These can be encryption keys that are easily guessable due to its length or composition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

unsecure protocols

A

These are protocols that fail to use encryption to protect usernames, passwords etc. Telnet is an unsecure protocol used to gain command line access to a remote server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

default settings

A

This can include admin setup pages that are meant to be disabled before moving a system into production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

open ports and services

A

This is an example of a weak configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firmware

A

This is the replacement for the traditional basic input/output system BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly