Unit 3 - Module 3 - Vulnerabilities Flashcards

1
Q

What do you call a weakness that can be explioted by a threat?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you call a way of taking advantage of a vulnerability?

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What would you call this list’s management protocol?

1) Idenfity vulnerabilites
2) Consider potential exploits
3) Prepare defenses against threats
4) Evaluate those defenses

A

Vulnerability Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do you call an exploit that was previously unknown?

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you call a layered approach to vulnerability management that reduces risk?

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 defense layers?

A

1) Perimeter Layer
2) Network Layer
3) Endpoint Layer
4) Application Layer
5) Data Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you call a mistake that can be exploited by a threat?

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the openly accessible dictionary of known vulnerabilities and exposures?

A

Common Vulnerabilities and Exposures list ( CVE list )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who is a collection of non-profit research and development centers?

A

MITRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you call the organization that volunteers to analyze and distribute information on eligible CVEs?

A

CVE Numbering Authority ( CNA )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is this list criteria?

1) Independent of other issues
2) Reconized as a potential security risk
3) Submitted with supporting evidence
4) Only affect one codebase

A

Criteria for CVE list

( Submitting vulnerabilitys for the public to know )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you call the measurement system that scores the severity of a vulnerability?

A

Common Vulnerability Scoring System (CVSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a nonprofit open platform foundation that works to improve the security of software?

A

OWASP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What foundation has these 10 common vulnerabilities listed for businesses to be aware of?

1) Broken Access Control
2) Cryptographic Failures
3) Injection
4) Insecure design
5) Security Misconfiguration
6) Vulnerable and outdated components
7) Identification and authentication failures
8) Software and data integrity failures
9) Security logging and monitoring failures
10) Server-side request forgery

A

OWASP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you call the internal review process of an organization’s security systems?

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What assessment process is this?

1) Identification
2) Vulnerability Analysis
3) Risk Assesssment
4) Remediation

A

Vulnerability Assessment Process

17
Q

What do you call a software that automatically compares known vulnerabilites and exposures against the technologies on the network?

A

Vulnerability Scanner

18
Q

What layer is made up of technologies like network firewalls and others?

A

Network Layer

19
Q

What layer authenticates systems that validates users access?

A

Perimeter Layer

20
Q

What layer describes devices on a network, like laptops, desktops, or servers?

A

Endpoint Layer

21
Q

What layer involves the software that users interact with?

A

Application Layer

22
Q

What layer includes any information that’s stored, in transit, or in use?

A

Data Layer

23
Q

What do you call a software and operating system update tha taddresses security vulnerabilities witin a program or product?

A

Patch Update

24
Q

What is the advantage and disadvantage of manual updates?

A

Advantage - Being able to control, it’s useful when updates are not throughly testsed by developers.

Disadvantage - Critical updates can be forgotten or disregarded.

25
Q

What penetration testing is when the tester has the same priviledged access that an internal developer would have?

A

Open-box testing

26
Q

What penetration testing is when the tester has little to no access to internal systems?

A

Closed-box testing

27
Q

What penetration testing is when the tester has limited access and knowledge of an internal system?

IE) Customer service rep has limited knowledge

A

Partial knowledge testing

28
Q

What do you call the process of strengthening a system to reduce its vulnerabilities and attack surface?

A

Security Hardening

29
Q

What do you call the internal review process of an organization’s security systems?

A

Vulnerability Assessments

30
Q

What do you call external security vendors and freelance hackers that some companies incentivize to find and report vulnerabilities?

A

Bug Bounty

31
Q

What do you call a person who might use their skills to achieve a political goal?

They’re an activist

A

Hacktivist

32
Q

What do you call a threat actor that maintains unauthorized access to a system for an extended period of time?

A

Advanced Persistent Threat (APT)

33
Q

What are 7 ways a threat actors gain access?

A

1) Direct Access - Referring to instances when they have physical access to a system
2) Removeable media - Portable hardware, like USB flash drives
3) Social Media plateforms - Used for communication and content sharing
4) Email - Both personal and business accounts
5) Wireless Networks - on permises
6) Cloud Services - Usually provided by third-party organizations
7) Supply Chains - Third party vendors that can persent a backdoor into systems

34
Q

What do you call the pathways attackers use to penetrate security defences?

A

Attack Vectors