Exam Prep Flashcards

1
Q

What is exploitation?

A

Refers to the stage in the cyber attack lifecycle where attacks take advantage of identified vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the diff between SOAR and SIEM

A

SOAR are used for threat/vul, SIEM are not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a threat?

A

Network is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a vulnerability?

A

Lack of an access list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is risk assessment?

A

Configuration review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an exploit?

A

Leakage of classified material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the diff between a threat and a risk?

A

Threat represents a potential danger that could take advantage of a weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is risk?

A

Risk is the likelihood of a threat exploiting a vulnerability, leading to potential damage, loss or compromise of assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is vulnerability management framework

A

Managing, mitigating vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which metric is used to capture the level of access needed to launch a successful attack?

A

Privileges required (CVSS - vuln scoring system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Diff between attack vector and attack surface?

A

An attack vector refers to the specific method that an attacker uses to exploit a particular vulnerability within the attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the relationship between a vulnerability and a threat?

A

A threat exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a vulnerability?

A

Represents a weakness or flaw in a system, app or network that can potentially be exploited by a threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the diff between signature-based and behavioral based detection?

A

Signature based uses a known vuln database, while behavior based intelligently summarizes existing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the diff between risk and vuln

A

Risk refers to the possibility of harm of loss resulting from exploiting a vulnerability. Vulnerability is a weakness or flaw in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of access control depends on the job function of the user?

A

role-based access control

17
Q

Agentbased vs agentless monitoring

A
18
Q

What is an exploit?

A

An exploit is the means by which attackers take advantage of vulnerabilities to carry out an attack. THREAT IS POTENTIAL HARM.

19
Q

What is the diff between DAC and RBAC?

A

DAC, allows owner of an object to define who has access to it. Permissions are applied on user and group levels. RBAC defines permissions based on a users role

20
Q

Scareware

A

Think, screens with flashing colors

21
Q

Define Risk

A

Reflects the likelihood of a threat exploiting vulnerabilities. Risk is the intersection between the threat (potential harm) and vulnerabilities (weaknesses or flaws)

22
Q
A