Network Security Flashcards
What is the abbreviation for information security?
InfoSec
What is the abbreviation for security operations?
SecOps
What is a person, device, information or locations that SecOps aims to protect from attack
Asset
What is an action taken by a threat that exploits a vulnerability?
Attack
What is the potential of a threat to exploit a vulnerability?
Risk
What is the abbreviation for IT security operations responsible for protecting assets by reducing the risk of attacks?
SecOps
What is something or someone that can exploit a vulnerability to attack an assett?
Threat
What is a weakness in software, hardware, facilities or humans that can be exploited by a threat?
Vulnerability
What is an indispensable tool for detecting vulnerabilities within servers, computers and network devices?
Vulnerability Scanner
You need to protect your assets from both what?
Physical and electronic security matters
Blank that aren’t changed in network devices are easy to find online for an attacker
Default passwords
What unleashes a multitude of viruses or malware or ransomware into a network from one seemingly innocuous computer?
Trojan Horse
What is a virus laying in wait for some preordained time or a trigger to release its attack?
Advanced Persistent Threat (APT)
What is the real danger of an APT attack?
Backups are infected
What is the term for an exploit or vulnerability that is not yet known to the public, so there is no patch available to mitigate it.
Zero Day Exploits
Who allows administrators to forward unknown or suspicious code patterns for analysis?
Intrusion Prevention System (IPS) vendors
Who is tasked with attempting to compromise a network’s security?
Penetration tester
Who is responsible for scanning servers and network devices for known vulnerabilities?
Vulnerability tester
What is nessus.com
Vulnerability scanning tool
Which team attempts to compromise the security?
Red team
Which team attempts to defend a network’s security?
Blue team
Which team is the continuous improvement team that debrief and cross-train each other after an attack?
Purple team
Who are IT professionals who specialize in penetrating or compromising network security but only to help improve its own security posture?
White hat hackers
Who possess the knowledge and will to breach systems for profit?
Black hat hackers