1.Learning Aim C1 Flashcards

(18 cards)

1
Q

What is a cybersecurity protection plan?

A

A plan that assesses the vulnerabilities within a network and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who can perform vulnerability assessments?

A

Internal teams or external groups such as white-hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of independent third-party reviews?

A

To verify that all vulnerabilities and threats are mitigated in system designs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is penetration testing?

A

Simulating a cyber attack to identify vulnerabilities in a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do port scanners do?

A

Scan a computer for open ports that may be exploited by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of a registry checker?

A

Performs backups of the registry and checks for errors on start-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do website vulnerability scanners search for?

A

Vulnerabilities such as cross-site scripting (XSS), SQL injection, and insecure server configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is vulnerability detection and management software?

A

Software that analyzes IT systems for threats and identifies key flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does assessing user vulnerabilities involve?

A

Auditing access requirements, training completed, and complexity of passwords set by staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the benefits of third-party reviews?

A

Access to specialist cybersecurity skills and cost savings from preventing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of a white-hat hacker?

A

A specialist who performs penetration testing for organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the OWASP Top 10?

A

A list identifying the most common threats to web applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: Injection flaws involve an interpreter being tricked into executing _______.

A

unauthorized commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: Broken authentication allows for _______ to be exploited.

A

passwords, keys, and session tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: Sensitive data exposure occurs when data lacks sufficient _______.

A

protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: Security misconfiguration includes insecure default _______.

A

configurations

17
Q

True or False: Cross-site scripting involves executing scripts to hijack user sessions.

18
Q

What are the consequences of insufficient logging and monitoring?

A

Allows continuous attacks, leading to further data tampering and destruction