Terms Flashcards

(22 cards)

1
Q

What is a vulnerability in the context of cybersecurity?

A

A vulnerability is a weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: An exploit is a tool or technique used to take advantage of a vulnerability.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: A software ________ is a flaw that can be exploited by attackers.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary goal of an exploit?

A

To take advantage of a vulnerability to gain unauthorized access or perform malicious actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a zero-day exploit?

A

A zero-day exploit is an attack that occurs on the same day a vulnerability is discovered, before a patch is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: An ________ is a piece of code that takes advantage of a vulnerability.

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Vulnerabilities can exist in hardware, software, and network configurations.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between a vulnerability and an exploit?

A

A vulnerability is a weakness, while an exploit is a method to take advantage of that weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a vulnerability assessment?

A

To identify and evaluate vulnerabilities in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: Exploits can be categorized as ________ or ________ based on their method of delivery.

A

remote, local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary purpose of authentication?

A

To verify the identity of a user or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Authorization determines what an authenticated user can do.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: __________ is the process of granting access to resources based on user permissions.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between authentication and authorization?

A

Authentication verifies identity; authorization determines access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Short Answer: Name one common method of authentication.

A

Username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: __________ is often used to enhance authentication security by requiring multiple forms of verification.

A

Multi-factor authentication

17
Q

What is a vector in the context of cybersecurity?

A

A vector is a method or pathway by which an attacker gains access to a system or network.

18
Q

True or False: A payload is the part of malware that performs the intended malicious action.

19
Q

Fill in the blank: The __________ is often delivered via a vector and is responsible for executing harmful activities on the target system.

20
Q

Short answer: What is the primary difference between a vector and a payload?

A

A vector is the delivery method for an attack, while a payload is the actual malicious code or action executed.

21
Q

Why does the OSI network model have the presentation and session layers while the TCP/IP network model does not?

A

The TCP/IP model is a simpler and more practical, designed around actual protocols used in real networks. It combines the functionality of the presentation and session layers into the application layer.