Topic 2 Flashcards

(30 cards)

1
Q

Malware

A

Refers to malicious software designed to disrupt, damage or gain unauthorized access to systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware Prevention Methods

A
  1. Regular Software Updates
  2. Antivirus Software
  3. Network Segmentation
  4. Educate Users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware Prevention Tools and Strategies

A
  1. Patch Management Systems
  2. Endpoint Detection and Response (EDR)
  3. Regular Backups
  4. Network Segmentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

Involves tricking individuals into providing sensitive information by pretending to be a trusted entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing Prevention Methods

A
  1. Email Filtering
  2. Employee Training
  3. Verify Links and Senders
  4. Multi-Factor Authentication (MFA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing Prevention Tools and Strategies

A
  1. Email Security Gateways
  2. Phishing Simulations
  3. Zero Trust Access
  4. Threat Intelligence Feeds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Engineering

A

This threat exploits human psychology to manipulate individuals into divulging confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering Prevention Methods

A
  1. Strict Access Control
  2. Verify Requests
  3. Awareness Programs
  4. Incident Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering Prevention Tools and Strategies

A
  1. Access management
  2. Strong Internal Authentication
  3. Verification Protocols
  4. Social Engineering Defense Training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software Vulnerabilities

A

Flaws or weaknesses in code that attackers can exploit to compromise systems, steal data, or gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software Vulnerabilities

Common Vulnerabilities

A
  1. Buffer Overflow
  2. Injection Flaws (SQL/Command injection)
  3. Cross-Site Scripting (XSS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hardware Vulnerabilities

A
  1. Physical Access Exploits
  2. Side-Channel Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Vulnerabilities

A

Weaknesses in network protocols, configurations, or infrastructure that can lead to unauthorized access or data interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Vulnerabilities

Common Vulnerabilities

A
  1. Weak or Default Credentials
  2. Man-in-the-Middle (MITM) Attacks
  3. Unsecured Network Devices
  4. Denial of Service (DoS) and Distributed Denial of Service (DDos Attacks:
  5. Outdated or Insecure Protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tools for Prevention and Mitigation For Software Vulnerabilities

A
  • Static Application Security Testing (SAST)
  • Dynamic Application Security Testing (DAST)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tools for Prevention and Mitigation For Hardware Vulnerabilities

A
  • Hardware Monitoring Tools
  • Device Integrity Tools
  • Penetration Testing Tools
17
Q

Tools for Prevention and Mitigation For Network Vulnerabilities

A
  • Vulnerability Scanning
  • Intrusion Detection and Prevention (IDS/IPS)
18
Q

Denial of Service (DoS)

A

Overloading systems of networks to make them unavailable to legitimate users

19
Q

Man in the Middle (MITM) Attacks

A

Intercepting communication between two parties to eavesdrop or alter data

20
Q

Password Attacks

A

Cracking or steals passwords through brute force, dictionary, attacks, or keylogging

21
Q

Zero-Day Exploits

A

Exploiting software vulnerabilities before the vendor releases a patch

22
Q

Refers to malicious software designed to disrupt, damage or gain unauthorized access to systems

23
Q

Involves tricking individuals into providing sensitive information by pretending to be a trusted entity

24
Q

This threat exploits human psychology to manipulate individuals into divulging confidential information

A

Social Engineering

25
Flaws or weaknesses in code that attackers can exploit to compromise systems, steal data, or gain unauthorized access
Software Vulnerabilities
26
Weaknesses in network protocols, configurations, or infrastructure that can lead to unauthorized access or data interception
Network Vulnerabilities
27
Overloading systems of networks to make them unavailable to legitimate users
Denial of Service (DoS)
28
Intercepting communication between two parties to eavesdrop or alter data
Man in the Middle (MITM) Attacks
29
Cracking or steals passwords through brute force, dictionary, attacks, or keylogging
Password Attacks
30
Exploiting software vulnerabilities before the vendor releases a patch
Zero-Day Exploits