Cyber Threats & Vulnerabilities

Beschreibung

In the course you gained understanding of the threats, and where adversaries might commonly attack an enterprise: •Summarize common vulnerability definitions •Explain configuration weaknesses at the infrastructure level •Identify insecure system settings that reduce security •Describe the difficulties of keeping up with security patches •List weaknesses that missing patches could introduce into enterprises •Summarize attacker techniques
Gilbert Garcia
Quiz von Gilbert Garcia, aktualisiert more than 1 year ago
Gilbert Garcia
Erstellt von Gilbert Garcia vor fast 3 Jahre
8
0

Zusammenfassung der Ressource

Frage 1

Frage
The potential source of an adverse event” is known as a _________?
Antworten
  • Compromise
  • Vector
  • Threat
  • Countermeasure

Frage 2

Frage
Which of the following actors is most likely to use tools they didn’t create and have little knowledge of?
Antworten
  • Black Hat
  • Script Kiddie
  • Malicious Hacker
  • Nation-State

Frage 3

Frage
Which of the following is most likely to be motivated by social, ideological, or political differences?
Antworten
  • Criminals
  • Hacktivists
  • Insiders
  • Ransomware

Frage 4

Frage
Which of the following best describes a vulnerability?
Antworten
  • A method
  • A weakness
  • An exploit
  • A control

Frage 5

Frage
Which of the following is NOT a factor in deciding risk?
Antworten
  • Vulnerability
  • Impact
  • Persistence
  • Threat

Frage 6

Frage
Which of the following often delays the timely installation of patches?
Antworten
  • Server patches always require changes in the network routers.
  • It takes time to test patches to ensure they do not adversely impact system functionality.
  • Patches change the log files of the device.
  • The Risk Management Framework mandates that we wait to install patches.

Frage 7

Frage
Why is keeping up with security patches so difficult?
Antworten
  • Users are untrained.
  • Patch management systems are too expensive.
  • Patches are required at multiple levels (applications, operating systems, firmware, etc.).
  • Printer problems demand more attention.

Frage 8

Frage
Which of the following is a weakness that attackers most often exploit?
Antworten
  • Complexity of the Risk Management Framework
  • Lack of network engineers
  • Misconfigured network switch settings
  • Lack of user awareness
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security 210-260 IINS - Exam 3
Mike M
CCNA Security Final Exam
Maikel Degrande
Spyware
Sam2
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
CyberSecurity
Stephen Williamson
Security Policies
indysingh7285
McAfee Advance Threat Defense - Training Quiz
esnlalan
Xtreme Ice (Cyber Range) Pitch Quiz
Jade Kennedy
Cisco IT Essentials 7.0 | Chapter 13: Security Exam
dksajpigbdu asdfagdsga
Cyber Wellness Quiz
mycaleb
FIT3031 - Network Security Exam Practice
Nicholas Bagnall