Cyber Vulnerabilites Flashcards

1
Q

Software designed to harm or exploit vulnerabilities, such as viruses, worms, and ransomware.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering attacks tricking individuals into providing sensitive information, like usernames and passwords.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inadequate password policies, unpatched software, and lack of encryption exposing vulnerabilities.

A

Weak Security Practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

User errors, like accidental data deletion or misconfigurations, compromising security.

A

Human Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Using outdated or unsupported software leaves systems open to known vulnerabilities.

A

Outdated Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Poor network security measures like weak firewalls and unsecured wireless networks.

A

Insufficient Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unknown vulnerabilities exploited before developers can patch them.

A

Zero-Day Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical theft or damage of computers leading to data breaches.

A

Physical Security Breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious or negligent actions from within an organization.

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerabilities introduced by third-party vendors and software.

A

Third-Party Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compromised software or hardware from suppliers, affecting all users of these products.

A

Supply Chain Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inadequate security measures in Internet of Things devices introducing new risks.

A

IoT Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Employees not trained to recognize and respond to security threats becoming cybersecurity liabilities.

A

Lack of Employee Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sophisticated, prolonged attacks targeting specific organizations or nations.

A

Advanced Persistent Threats (APTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unintentional exposure of sensitive data through misconfigurations or carelessness.

A

Data Leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Increased targeting of smartphones and tablets for business use leading to new security challenges.

A

Mobile Device Vulnerabilities

17
Q

Vulnerabilities in cloud computing like data breaches and compromised credentials.

A

Cloud Computing Risks

18
Q

Techniques like pretexting, baiting, and tailgating used to manipulate individuals into breaking security protocols beyond just phishing.

A

Other Social Engineering Tactics