Vulnerability Sample Questions Flashcards

1
Q

What part of the cyber kill chain corresponds to vulnerability scanning?

A

Reconnaissance

Vulnerability scanning is typically part of the reconnaissance phase, where attackers gather information about potential vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an example of sandboxing?

A

Running untested code in a virtual environment

Sandboxing isolates the code execution to prevent any potential harm to the host system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits of full-drive encryption?

A
  • Protects data at rest
  • Prevents unauthorized access
  • Ensures compliance with data protection regulations

Full-drive encryption secures all data on a drive, making it unreadable without the correct decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the drawbacks of full-drive encryption?

A
  • Potential performance impact
  • Recovery challenges if encryption key is lost
  • Complexity in management

Full-drive encryption can slow down system performance and complicate recovery processes in case of lost keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a stateful firewall do that a traditional packet filtering firewall does not?

A

Tracks the state of active connections

Stateful firewalls maintain context about active sessions, allowing for more advanced filtering based on connection states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does an application-level firewall (or next gen firewall) do that a traditional packet filtering firewall does not?

A

Inspects application data and behavior

Application-level firewalls can analyze specific application protocols and detect more sophisticated threats than basic packet filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly