Module 2 - Securing Networks Flashcards
(100 cards)
Which organization provides an interactive global map that shows live network attacks based on its deployed security products?
Kaspersky
Which Cisco team is tasked with investigating and mitigating vulnerabilities in Cisco products?
Cisco Product Security Incident Response Team (PSIRT)
Which Cisco group provides threat intelligence to defend customers and protect digital assets?
Cisco Talos intelligence group
Which type of network attack occurs when a system can no longer support requests from legitimate users due to overload or interruption?
A DoS attack (Denial of Service).
What term describes the path a threat actor uses to gain access to a server, host, or network?
An Attack Vector
Why are internal threats potentially more damaging than external threats?
Internal threats are potentially more damaging because internal users have direct access to infrastructure and data
Which type of threat may involve actions like disconnecting critical network connections or copying data to external media?
An internal threat
What is considered one of an organization’s most valuable assets that must be protected from exfiltration?
Data
What kind of threat can result from a user inserting an infected USB drive into a corporate system?
An Internal threat
What term refers to the unauthorized theft, loss, or leakage of sensitive organizational data?
Data loss or data exfiltration
What controls must organizations implement to prevent data loss and protect sensitive information?
DLP (Data Loss Prevention) controls.
Which aspect of device security is crucial in preventing data loss from stolen hardware?
Encryption of the stored data
What is the first line of defense against unauthorized access to sensitive data?
Strong and secure passwords
Which concept refers to a potential danger to an organization’s asset, such as data or its network infrastructure?
A Threat - {a possible event or actor that may cause harm by targeting valuable assets like data, servers, or devices.}
Which term describes a flaw or weakness in a system’s design or configuration that could be used by a threat to gain unauthorized access or control?
A Vulnerability -{it represents a weak point in the system that a threat actor can exploit.}
Which concept represents the combined total of all vulnerabilities in a system that are exposed and accessible to an attacker?
The Attack Surface - {this includes every potential entry and exit point in a system, such as unpatched software or exposed services.}
Which term defines the probability that a threat will successfully exploit a vulnerability and cause harm to an asset?
Risk -{it measures the likelihood and impact of a threat actor exploiting a specific weakness.}
Which type of exploit allows an attacker to compromise a system over a network without needing prior access to it?
A remote exploit -{ it does not require the attacker to have an account or direct access to the target system.}
Which term refers to the tool, method, or technique used to take advantage of a vulnerability in order to compromise a system?
An Exploit - {it is the actual mechanism or process that makes use of a vulnerability to harm or gain unauthorized control.}
Which type of hacker uses their programming knowledge for ethical and legal purposes, such as performing penetration tests and reporting security flaws to developers?
White hat hackers
Which type of exploit is used when the attacker already has user or administrative access on the target system?
A local exploit -{this involves leveraging a vulnerability from within the system, without necessarily needing physical access.}
Which strategy eliminates an activity or asset entirely to prevent any exposure to associated risks, even if it means losing its benefits?
Risk Avoidance -{this method removes the source of the risk by stopping the activity that causes it.}
Which risk management strategy involves taking no action because the cost of protection is greater than the cost of the potential risk?
Risk acceptance -{this strategy accepts the risk as-is without applying mitigation due to cost inefficiency}
Which risk management approach involves minimizing the likelihood or consequences of a risk by taking protective actions, and is considered the most commonly used method?
Risk Reduction -{this involves applying cost-effective actions that lower either the impact or likelihood of the risk.}