Vulnerability Types Flashcards

1
Q

Zero day

A

An attack that occurs on a vulnerability after a software has been released

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Default settings

A

Default settings can be researched and hacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unsecured accounts

A

Accounts that are left unsecured become targets for attackers looking to execute attacks with elevated privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Open permissions

A

Accounts or programs not having properly restricted permissions (principal of least privilege)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Outdated protocols

A

Don’t use them if you don’t have to. WEP/ WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unsecured protocols

A

Telnet smtp, pop3, LDAP and more are not secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Open ports

A

Unnecessary ports, protocols, and services running or open when not needed, increasing the attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Third party risk

A

Anything (hardware, software, cloud service providers) you depend on someone else to provide falls into this category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shadow IT

A

Unauthorized software or hardware on the network or systems (end user actions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Improper or weak patch management

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly