1.6 Vulnerabilities & Security Concerns Flashcards

1
Q

Security concerns of a zero-day vulnerability

A
  1. Nearly impossible to defend against a vulnerability that is unknown
  2. Important to keep up to date on newly emerging vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security concern of open permissions

A

When data is stored across different systems it becomes easier to make a configuration mistake leaving open access to the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security concern of unsecure root/admin accounts

A

Hackers could gain access to a system if the root/admin accounts have default, weak, or unset passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security concern of app error messages

A

Not properly masking app error messages could expose valuable information an attacker could use to breach a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security concerns of weak encryption protocols

A

Use of weak encryption protocols could expose sensitive data. Also important to keep up to date on encryption protocols to ensure that data is not exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security concerns of unsecure protocols

A

Many protocols, such as HTTP, FTP, Telnet, send data in clear text without encryption exposing transmitted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security concerns of default settings

A

Some devices have default admin passwords set or default settings that are unsecure. Ensure any new devices are properly configured and secured before live use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security concerns of open ports/services

A

It is easy to mis-type when creating ACLs or forget to block unused ports which creates an opening for attackers to exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security concerns of using third-party vendors

A

Third-party vendors often have direct access to data and hardware. Must monitor and check all services provided by third-party vendors to ensure that everything is secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a key security concern of systems integration with external systems?

A

Ensuring those systems share the same security standards as your organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a key security concern involving lack of vendor support

A

When evaluating products from vendors it is important to ensure that they provide adequate support and system updates/patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security concerns/risks of supply chain

A

Equipment/software could be compromised prior to delivery from a vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 key practices to address security concerns of outsourced development

A
  1. Block access to production environment
  2. Don’t provide sensitive data for testing purposes
  3. review all code to ensure integrity and no back doors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security concerns of outsourced data storage

A

Must ensure that all data is stored and transmitted with proper security per organization standards and legal regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 key software types to include in a patch management plan

A

Firmware, Operating System, Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security risks associated with legacy platforms

A

Legacy platforms are often full of security vulnerabilities and must be isolated to mitigate the damage of a security breach