Security+ Practice Tests 6-10 Flashcards
Which of the following does NOT refer to an email communication threat vector?
Skimming
Malicious attachment
Social engineering
Malicious URL
Phishing
Skimming
Skimming is collecting PII from a payment card.
Which of the following mitigates the risk of supply chain attacks?
DRP (Disaster Recovery Plan)
Vendor/intermediary checks
BCP (Business Continuity Plan)
IRP (Incident Response Plan)
Vendor/intermediary checks
A comprehensive security screening of a potential third-party vendor before forming a partnership.
VDD (Vendor Due Diligence)
DRP stands for
Disaster Recovery Plan
BCP stands for
Business Continuity Plan
IRP stands for
Incident Response Plan
A detailed strategy and set of systems for ensuring an organization’s ability to prevent or rapidly recover from a significant disruption to its operations.
BCP (Business Continuity Plan)
A written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident.
IRP (Incident Response Plan)
A formal document created by an organization that contains detailed instructions on how to respond to unplanned incidents such as natural disasters, power outages, cyber attacks and any other disruptive events.
DRP (Disaster Recovery Plan)
Examples of social media threat vectors include:
PII harvesting
social engineering
identity/account theft
malicious URLs
all of the above
All of the above
Threat intelligence gathered from publicly available sources
OSINT
OSINT stands for
Open Source Intelligence
Insight gained from processing and analyzing public data sources such as broadcast TV and radio, social media, and websites. These sources provide data in text, video, image, and audio formats.
OSINT (Open-Source Intelligence)
RFC stands for
Request for Comments
A formal standards-track document developed in working groups within the Internet Engineering Task Force (IETF). Contains specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.
RFC (Request for Comments)
The U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. Provides advanced searching features.
NVD (National Vulnerability Database)
NVD stands for
National Vulnerability Database
CVE stands for
Common Vulnerabilities and Exposures
A publicly available catalog of cybersecurity vulnerabilities. Contains a list of records each containing an identification number, a description, and at least one public reference. Feeds NVD.
CVE (Common Vulnerabilities and Exposures)
What is CVE/NVD?
Two different programs that publicly disclose known cybersecurity vulnerabilities. They are both set up for a user to search by OS, platform, etc.
The CVE was launched by the MITRE Corporation as a community effort.
The NVD was launched by the NIST (National Institute of Standards and Technology).
NIST stands for
National Institute of Standards and Technology
Which of the following refer to vulnerability databases? (Select 2)
DBA
CVE
DBaaS
NVD
AIS
CVE (Common Vulnerabilities and Exposures)
NVD (National Vulnerability Database)
DBA stands for
Database Administrator
DBaaS stands for
Database as a Service
AKA managed database service