Gilbert Garcia
Test por , creado hace más de 1 año

In the course you gained understanding of the threats, and where adversaries might commonly attack an enterprise: •Summarize common vulnerability definitions •Explain configuration weaknesses at the infrastructure level •Identify insecure system settings that reduce security •Describe the difficulties of keeping up with security patches •List weaknesses that missing patches could introduce into enterprises •Summarize attacker techniques

8
0
0
Gilbert Garcia
Creado por Gilbert Garcia hace casi 3 años
Cerrar

Cyber Threats & Vulnerabilities

Pregunta 1 de 8

1

The potential source of an adverse event” is known as a _________?

Selecciona una de las siguientes respuestas posibles:

  • Compromise

  • Vector

  • Threat

  • Countermeasure

Explicación

Pregunta 2 de 8

1

Which of the following actors is most likely to use tools they didn’t create and have little knowledge of?

Selecciona una o más de las siguientes respuestas posibles:

  • Black Hat

  • Script Kiddie

  • Malicious Hacker

  • Nation-State

Explicación

Pregunta 3 de 8

1

Which of the following is most likely to be motivated by social, ideological, or political differences?

Selecciona una de las siguientes respuestas posibles:

  • Criminals

  • Hacktivists

  • Insiders

  • Ransomware

Explicación

Pregunta 4 de 8

1

Which of the following best describes a vulnerability?

Selecciona una de las siguientes respuestas posibles:

  • A method

  • A weakness

  • An exploit

  • A control

Explicación

Pregunta 5 de 8

1

Which of the following is NOT a factor in deciding risk?

Selecciona una o más de las siguientes respuestas posibles:

  • Vulnerability

  • Impact

  • Persistence

  • Threat

Explicación

Pregunta 6 de 8

1

Which of the following often delays the timely installation of patches?

Selecciona una de las siguientes respuestas posibles:

  • Server patches always require changes in the network routers.

  • It takes time to test patches to ensure they do not adversely impact system functionality.

  • Patches change the log files of the device.

  • The Risk Management Framework mandates that we wait to install patches.

Explicación

Pregunta 7 de 8

1

Why is keeping up with security patches so difficult?

Selecciona una de las siguientes respuestas posibles:

  • Users are untrained.

  • Patch management systems are too expensive.

  • Patches are required at multiple levels (applications, operating systems, firmware, etc.).

  • Printer problems demand more attention.

Explicación

Pregunta 8 de 8

1

Which of the following is a weakness that attackers most often exploit?

Selecciona una o más de las siguientes respuestas posibles:

  • Complexity of the Risk Management Framework

  • Lack of network engineers

  • Misconfigured network switch settings

  • Lack of user awareness

Explicación