Terms Flashcards
(22 cards)
What is a vulnerability in the context of cybersecurity?
A vulnerability is a weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.
True or False: An exploit is a tool or technique used to take advantage of a vulnerability.
True
Fill in the blank: A software ________ is a flaw that can be exploited by attackers.
vulnerability
What is the primary goal of an exploit?
To take advantage of a vulnerability to gain unauthorized access or perform malicious actions.
What is a zero-day exploit?
A zero-day exploit is an attack that occurs on the same day a vulnerability is discovered, before a patch is available.
Fill in the blank: An ________ is a piece of code that takes advantage of a vulnerability.
exploit
True or False: Vulnerabilities can exist in hardware, software, and network configurations.
True
What is the difference between a vulnerability and an exploit?
A vulnerability is a weakness, while an exploit is a method to take advantage of that weakness.
What is the purpose of a vulnerability assessment?
To identify and evaluate vulnerabilities in a system.
Fill in the blank: Exploits can be categorized as ________ or ________ based on their method of delivery.
remote, local
What is the primary purpose of authentication?
To verify the identity of a user or system.
True or False: Authorization determines what an authenticated user can do.
True
Fill in the blank: __________ is the process of granting access to resources based on user permissions.
Authorization
What is the difference between authentication and authorization?
Authentication verifies identity; authorization determines access rights.
Short Answer: Name one common method of authentication.
Username and password
Fill in the blank: __________ is often used to enhance authentication security by requiring multiple forms of verification.
Multi-factor authentication
What is a vector in the context of cybersecurity?
A vector is a method or pathway by which an attacker gains access to a system or network.
True or False: A payload is the part of malware that performs the intended malicious action.
True
Fill in the blank: The __________ is often delivered via a vector and is responsible for executing harmful activities on the target system.
payload
Short answer: What is the primary difference between a vector and a payload?
A vector is the delivery method for an attack, while a payload is the actual malicious code or action executed.
Why does the OSI network model have the presentation and session layers while the TCP/IP network model does not?
The TCP/IP model is a simpler and more practical, designed around actual protocols used in real networks. It combines the functionality of the presentation and session layers into the application layer.