Chapter 1: Cybersecurity Fundamentals Flashcards

1
Q

What is a collection of industry standards and best practices to help organizations manage cybersecurity risks?

A

NIST Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ is any potential danger to an asset?

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is a weakness in the system design, implementation, software, or code, or the lack of a mechanism?

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the name for a piece of software, tool, technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system?

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is referred to as the knowledge about an existing or emerging threat to assests, including networks and systems?

A

Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerabilities are typically identified by a ?

A

CVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a type of vulnerability where the flaw is in a web application but the attack is against an end user?

A

XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cybersecurity?

A

Process of protecting information by preventing, detecting, and responding to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST

A

National Institute of Standards and Technology

Collection of industry standards and best practices to help organizations manage cybersecurity risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat

A

Any potential danger to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The entity that takes advantage of the vulnerability?

A

Malicious Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The path used by a malicious actor to perform the attack is known as?

A

threat agent
threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerability

A

A weakness in a system design, implementation, software, or code, or lack of a mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exploit

A

Piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Deep Web vs Dark Web

A

Deep Web - A collection of information and systems on the internet that is not indexed by web search engines.

Dark Web (Darknet) - is an overlay of networks and systems that use the internet but require specific software and configurations to access it.

17
Q

Command-line tool that allows you to download a copy of the Exploit Database so that you can use it on the go?

A

searchspoilt

18
Q
A