M3 - Network Security Concepts Flashcards

Review

1
Q

It is anything of value to the organization. In includes people equipment, resources, and data.

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is a weakness in a system, or its design, that could be exploited by a threat.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is a potential danger to a company’s assets, data or network functionality.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is a mechanism that takes advantage of a vulnerability.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is a counter-measure that reduces the likelihood or severity of a potential threat or risk. Network Security involves multiple mitigation techniques.

A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is the likelihood of a threat to exploit the vulnerability of a asset, with the aim of negatively affecting an organization. It is measured using the probability of the occurence of an event and its consequences.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intercepted email or IM messages could be captured and reveal confidential information.

A

Email/Social Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If the data is not stored using an encryption algorithm, then the thief can retrieve valuable confidential data.

A

Unencrypted Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sensitive data can be lost if access to the cloud is compromised due to weak security settings.

A

Cloud Storage Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One risk is that an employee could perform an unauthorized transfer of data to a USB drive. Another risk is that a USB drive containing valuable corporate data could be lost.

A

Removable Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidential data should be shredded when no longer required.

A

Hard Copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passwords or weak passwords which have been compromised can provide a threat actor with easy access to corporate data.

A

Improper Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly