Exam Prep Flashcards
(22 cards)
What is exploitation?
Refers to the stage in the cyber attack lifecycle where attacks take advantage of identified vulnerabilities
What is the diff between SOAR and SIEM
SOAR are used for threat/vul, SIEM are not
What is a threat?
Network is compromised
What is a vulnerability?
Lack of an access list
What is risk assessment?
Configuration review
What is an exploit?
Leakage of classified material
What is the diff between a threat and a risk?
Threat represents a potential danger that could take advantage of a weakness.
What is risk?
Risk is the likelihood of a threat exploiting a vulnerability, leading to potential damage, loss or compromise of assets.
What is vulnerability management framework
Managing, mitigating vulnerabilities
Which metric is used to capture the level of access needed to launch a successful attack?
Privileges required (CVSS - vuln scoring system)
Diff between attack vector and attack surface?
An attack vector refers to the specific method that an attacker uses to exploit a particular vulnerability within the attack surface.
What is the relationship between a vulnerability and a threat?
A threat exploits a vulnerability
What is a vulnerability?
Represents a weakness or flaw in a system, app or network that can potentially be exploited by a threat actor.
What is the diff between signature-based and behavioral based detection?
Signature based uses a known vuln database, while behavior based intelligently summarizes existing data.
What is the diff between risk and vuln
Risk refers to the possibility of harm of loss resulting from exploiting a vulnerability. Vulnerability is a weakness or flaw in a system.
What type of access control depends on the job function of the user?
role-based access control
Agentbased vs agentless monitoring
What is an exploit?
An exploit is the means by which attackers take advantage of vulnerabilities to carry out an attack. THREAT IS POTENTIAL HARM.
What is the diff between DAC and RBAC?
DAC, allows owner of an object to define who has access to it. Permissions are applied on user and group levels. RBAC defines permissions based on a users role
Scareware
Think, screens with flashing colors
Define Risk
Reflects the likelihood of a threat exploiting vulnerabilities. Risk is the intersection between the threat (potential harm) and vulnerabilities (weaknesses or flaws)