1.6 Vulnerability Types Flashcards

1
Q

This type of attack is becoming increasingly more common and involves the attacker finding a vulnerability prior to it being detected or published. Named as such because it is often found shortly after release.

A

Zero day attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attacks that involve attackers walking through backdoor vulnerabilities via unsecured permissions.

A

Open permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some good practices for administrator or root accounts in order to prevent unauthorized intrusion?

A
  • Disable login to default root accounts
  • Don’t use simple passwords
  • Protect existing admin accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of information can an error message provide to a potential attacker?

A

Service types

version information

debug data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This vulnerability involves the use of older encryption protocols, short encryption keys, and outdated hashes.

A

Weak encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability that is often due to firewall mismanagement that involves port or application traffic being allowed through.

A

Open ports and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This type of vulnerability can be caused by devices running old or end-of-life software. The risk needs to be weighed against the return for running those systems.

A

Legacy platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false: Third-party IT security can be trusted within your own organization.

A

False. More care should be taken with third-parties and the related security coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of security risks are posed with professional installation and maintenance of systems in your organziation?

A
  • Elevated OS access
  • Physical access for USB or keylogger installations
  • Able to run software on inernal network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the 5 major third party risks that come with outsourcing or working with other organizations.

A

System integration

Lack of vendor support

Supply chain risk

Outsourced code development

Data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the 5 major vulnerability impacts

A

data loss

identity theft

financial loss

reputation impacts

availability loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly