Chapter 6 Vulnerabilities Flashcards

1
Q

What is a Zero Day?

A

Vulnerabilities that are newly discovered and not yet addressed by a patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are compensating controls?

A

Controls that mitigate the risk indirectly, a common defense for zero days vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are weak configurations

A

Configurations that are set up poorly as so a hacker can take advantage and potentially gain control of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Open Permissions?

A

When there are no restrictions to something and everyone has full access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of Weak Configurations?

A

Open permissions, Unsecure Root Accounts, Weak Encryption, Errors, and Default settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some examples of third party risks?

A

Supply chain concerns, lack of vender support, Outsourced code Development, and data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is End of Life?

A

When something has reached the end of its useful life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is End of service life (EOSL)

A

When a manufacturer quits selling an item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where does a supply chain attack occurs?

A

At the weakest security link in the supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can Outsourced Code development be a third party risk?

A

When the third party doesn’t develop the code well with security in mind, potentially leaving backdoors and vulnerabilities in the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can Data Storage be a third party risk?

A

If the data is stored in multiple facilities where security may not be up to the same standard across all facilities potentially causing a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some examples of Improper or Weak Patch Management?

A

Firmware, Operating systems, Applications, and Legacy platforms that are not patched and updated allowing attackers to get into the systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is data loss?

A

when an organization actually loses information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are data breaches?

A

The release of data to unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly