Chapter 1 Cybersecurity Fundamentals Flashcards
Which of the following is a collection of industry standards and best practices to help organizations manage cybersecurity risks?
A. MITRE
B. NIST Cybersecurity Framework
C. ISO Cybersecurity Framework
D. CERT/cc
B
_________ is any potential danger to an asset.
A. Vulnerability
B. Threat
C. Exploit
D. None of these answers is correct.
B
A ___________ is a weakness in the system design, implementation, software, or code, or the lack of a mechanism.
A.. Vulnerability
B. Threat
C. Exploit
D. None of these answers are correct.
A
Which of the following is a piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system?
A. Exploit
B. Reverse shell
C. Searchsploit
D. None of these answers is correct.
A
Which of the following is referred to as the knowledge about an existing or emerging threat to assets, including networks and systems?
A. Exploits
B. Vulnerabilities
C. Threat assessment
D. Threat intelligence
D
Which of the following are examples of malware attack and propagation mechanisms?
A. Master boot record infection
B. File infector
C. Macro infector
D. All of these answers are correct.
D
Vulnerabilities are typically identified by a ___________.?
A. CVE
B. CVSS
C. PSIRT
D. None of these answers is correct.
A
SQL injection attacks can be divided into which of the following categories?
A. Blind SQL injection
B. Out-of-band SQL injection
C. In-band SQL injection
D. None of these answers is correct.
E. All of these answers are correct.
E
Which of the following is a type of vulnerability where the flaw is in a web application but the attack is against an end user (client)?
A. XXE
B. HTML injection
C. SQL injection
D. XSS
D
Which of the following is a way for an attacker to perform a session hijack attack?
A. Predicting session tokens
B. Session sniffing
C. Man-in-the-middle attack
D. Man-in-the-browser attack
E. All of these answers are correct.
E
A denial-of-service attack impacts which of the following?
A. Integrity
B. Availability
C. Confidentiality
D. None of these answers is correct.
B
Which of the following are examples of security mechanisms designed to preserve confidentiality?
A. Logical and physical access controls
B. Encryption
C. Controlled traffic routing
D. All of these answers are correct.
D
An attacker is able to manipulate the configuration of a router by stealing the administrator credential. This attack impacts which of the following?
A. Integrity
B. Session keys
C. Encryption
D. None of these answers is correct.
A
Which of the following is a cloud deployment model?
A. Public cloud
B. Community cloud
C. Private cloud
D. All of these answers are correct.
D
Which of the following cloud models include all phases of the system development life cycle (SDLC) and can use application programming interfaces (APIs), website portals, or gateway software?
A. SaaS
B. PaaS
C. SDLC containers
D. None of these answers is correct.
B