Operating System Vulnerabilities Flashcards

(5 cards)

1
Q

OS systems that have not been updated with latest security patches or fixes

A

Unpatched Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerabilities in software or hardware yet unknown to the developer and not publicly disclosed

A

Zero-Day Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs when systems settings are not properly configured, leaving the system vulnerable to exploitation

A

Misconfiguration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unauthorized data transfer from within an organization to an external location

A

Data exfiltration

Mitigation - defense in depth approach including use of encryption and endpoint protection tools like host-based firewalls to control inbound/outbound traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Occur when an attacker has been able to craft a malicious update to a well-known and trusted program in order to compromise the systems of the program’s end users

A

Malicious Updates

Mitigation: only source patches and updates from a trusted vendor and official channels
-Application allow-listing
-verify authenticity of updates using a digital signature or hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly