Vulnerabilities Flashcards

1
Q

A list of publicly disclosed computer security vulnerabilities and exposures database.

A

CVE - Common Vulnerabilities and Explosion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A vulnerability used against you that has never been seen up to this point. Meaning is brand new.

A

Zero-day Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When information has been put onto the internet but no security has been applied to that data, so an attacker just waited for you to leave the door open and walked into your system.

A

Open Permissions Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of encryption key management solution where only one key is used to both, encrypt and decrypt electronic data.

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of encryption that is also known as public key encryption, and makes the HTTPS protocol possible. Two keys are used instead of one.

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Below how many bits, are encryption ciphers considered weak and low in protection?

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Group of protocols that are less protective and should not be use to transmit data.

A

FTP, SMTP, IMAP, HTTP, and Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware that takes advantage of default usernames and passwords, and takes control of their system to make them part of a botnet group and eventually use it for DDoS attack. It is open souce so anyone can download it and modify it for their own purposes making it very dangerous.

A

Mirai Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network security software that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Term that refers to outdated or older computer systems.

A

Legacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Scan designed to look at systems to see if potential vulnerabilities might exist in an operating system, network device or application. Tries to determine from the outside if there is a potential threat access.

A

Vulnerability Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type of scan that looks into a device and tries to determined what ports happen to be responding to that IP Address.

A

Port Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When you scan as if you are someone who has no access to the network.

A

Non credentialed scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When you run a scan as if you where an insider and have access to the network.

A

Credential scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A vulnerability that is reported but doesn’t really exist.To avoid this, you should have your software scan tools updated to the latest version.

A

False Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A vulnerability exists but you didn’t detect it. To avoid this, you should have your software scan tools updated to the latest version.

A

False negative

17
Q

System designed to collect information from anything on the network that can create log files, security alerts, or any type of real time information that can tell us about what’s happening on the network right now.

A

SIEM - Security Information and Event Management

18
Q

Part of a SIEM and plays a crucial role in collecting and aggregating log data from various sources for analysis and correlation.

A

Syslog

19
Q

It is a cybersecurity technology that focuses on detecting insider threats, advanced persistent threats (APTs), and other malicious activities by analyzing the behavior of users and entities within an organization’s network.

A

UEBA - User and Entity Behavior Analytics

20
Q

The process of analyzing digital text to determine if the emotional tone of the message is positive, negative, or neutral.

A

Sentiment Analysis

21
Q

Technology helps coordinate, execute and automate tasks between various people and tools all within a single platform. This allows organizations to not only quickly respond to cybersecurity attacks but also observe, understand and prevent future incidents, thus improving their overall security posture.

A

SOAR - Security orchestration, automation, and response

22
Q

Refers to the ability of an attacker to maintain unauthorized access to a compromised system or network over an extended period of time, even after initial access has been achieved.

A

Persistence

23
Q

Refers to a compromised system or network component that an attacker uses as a foothold to launch further attacks or gain access to additional systems or resources within a target environment.

A

Pivot Point