SIRG-BSU_2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/66

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

67 Terms

1
New cards

The definition of __________ is a weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

Vulnerability.

2
New cards

A __________ is the potential for someone or something to exploit a vulnerability and breach security.

Threat.

3
New cards

The term __________ describes a person or entity that poses a potential security risk.

Threat actor.

4
New cards

The formula to assess __________ is Vulnerability + Threat = Risk (Impact * Likelihood).

Risk.

5
New cards

A __________ attack vector can be a direct physical or local attack where the threat actor exploits an unlocked workstation.

Direct access.

6
New cards

Creating an enhanced security environment involves assessing __________, threats, and the risk associated with potential attacks.

Vulnerabilities.

7
New cards

An example of a tool or method used by malicious threat actors is known as an __________.

Attack vector.

8
New cards

A malicious external threat actor must infiltrate the security system using __________ and/or social engineering.

Malware.

9
New cards

Insider threats often arise from employees, contractors, or business partners using their granted __________.

Permissions.

10
New cards

Malicious intent and motivation of a threat actor can be driven by __________, curiosity, or grievances.

Greed.

11
New cards

The __________ is a type of hacker with skills to gain access to systems without authorization, often for malicious purposes.

Black hat.

12
New cards

A __________ hacker seeks to find vulnerabilities without the owner's permission, potentially without exploitation.

Gray hat.

13
New cards

A team of hackers working collaboratively to develop sophisticated tools is referred to as a __________.

Hacker team.

14
New cards

The __________ describes the ongoing ability of an adversary to maintain access and compromise network security.

Advanced Persistent Threat (APT).

15
New cards

Threat research involves gathering efforts to discover the tactics, techniques, and __________ of cyber adversaries.

Procedures (TTPs).

16
New cards

Security teams use __________ to identify potential risks within their systems and how to mitigate them.

Security assessments.

17
New cards

The deep web contains pages that cannot be indexed by search engines and require __________ for access.

Registration.

18
New cards

Many security solution providers derive data from their customers' networks to analyze __________ and indicators.

Cybersecurity threats.

19
New cards

A malicious file attachment sent via email is considered an __________ attack vector.

Email.

20
New cards

The category of threat actors who use tools without understanding their functionality are often called __________.

Script kiddies.

21
New cards

The __________ actors are those who have no authorized access to the target system, often initiating attacks remotely.

External.

22
New cards

To assess the __________ of a vulnerability, one must consider the likelihood of exploitation and impact of a successful exploit.

Risk.

23
New cards

The __________ is defined as the method used by a threat actor to enter a system.

Attack vector.

24
New cards

The importance of __________ in network security has grown due to increasing cyber threats.

Risk assessment.

25
New cards

Hacktivists use cyber attacks to promote a __________ agenda.

Political.

26
New cards

Through a __________, security research findings can be shared and discussed among peers in the cybersecurity community.

Threat intelligence platform.

27
New cards

A __________ is a platform that provides threat intelligence and is often available through a subscription model.

Commercial threat intelligence platform.

28
New cards

Dark web sites often require __________ to access, using tools designed to anonymize users.

Specific software.

29
New cards

Apple offers public recognition for security researchers who submit valid reports through their __________ program.

Security bounty.

30
New cards

The ethical hacker category that seeks authorization to perform penetration testing is known as a __________.

White hat hacker.

31
New cards

Security assessments help to evaluate the __________ of a network and its defenses against attacks.

Integrity.

32
New cards

An external threat actor may infiltrate a system using __________ techniques to gain unauthorized access.

Social engineering.

33
New cards

To identify risks, one must evaluate both the __________ of an exploit and its potential impact.

Likelihood.

34
New cards

The presence of high-value __________ dictates prioritization in addressing cybersecurity vulnerabilities.

Assets.

35
New cards

A __________ relationship refers to the collaboration between security researchers and organizations to enhance security measures.

Public/private information sharing.

36
New cards

The use of __________ in network security refers to the various paths that malicious actors take to exploit systems.

Attack vectors.

37
New cards

Key __________ of threat research include understanding the motivations and capabilities of various threat actors.

Objectives.

38
New cards

The __________ entails malicious software concealed in attachments sent via communication channels.

Web and social media malware.

39
New cards

Threat actors classified based on their intentions and capabilities can be identified through multiple __________.

Categories.

40
New cards

Understanding __________ helps organizations implement appropriate defense strategies against potential cyber attacks.

Threat intelligence.

41
New cards

Organizations can gain insights into security risks by analyzing cyber threat __________ provided by various platforms.

Indicators.

42
New cards

The act of evaluating an organization’s infrastructure to locate vulnerabilities is called a __________ assessment.

Security.

43
New cards

The process of persuading users to perform actions that compromise security, such as opening malicious files, is known as __________ engineering.

Social.

44
New cards

A well-known example of a threat actor group that uses cyber weapons to attain political aims is __________.

Anonymous.

45
New cards

Risk assessment includes evaluating the ______________ and impact of vulnerabilities actively exploited by threats.

Likelihood.

46
New cards

Security firms leverage insights from __________ to guide their cybersecurity strategies effectively.

Incident reports.

47
New cards

The marketplace for illegal activities and underhanded operations on the internet is referred to as the __________.

Dark net.

48
New cards

To protect customers, Apple does not disclose security issues until its __________ is complete.

Investigation.

49
New cards

Penetration testing is typically performed by __________ hackers with prior authorization.

White hat.

50
New cards

Cybersecurity risk is always a function of __________ and the potential damage that could occur.

Vulnerability.

51
New cards

The concept of __________ encompasses the probability and implications of a security breach occurring.

Risk.

52
New cards

Engaging in __________ requires understanding both the technological aspects and human vulnerabilities inherent in cybersecurity.

Threat research.

53
New cards

Insider threats can come from employees or partners who misuse their __________ access for malicious purposes.

Granted.

54
New cards

Engagements in professional cybersecurity settings often rely on __________ sharing for better proactive measures against threats.

Information.

55
New cards

Hacking, in its origin, was perceived as a sign of technical skill and creativity, diverging into __________ and white hat distinctions.

Black hat.

56
New cards

Identifying __________ actors is crucial to frame the correct security strategies and allocate resources efficiently.

Threat.

57
New cards

An example of a __________ is exploiting an unlocked workstation or using an unsecured USB drive to compromise a system.

Direct access attack.

58
New cards

The likelihood of a security breach occurring involving improper __________ usage plays a key role in evaluating risks.

Configuration.

59
New cards

In cybersecurity, understanding the roles and behaviors of threat __________ is essential for enhancing overall security measures.

Actors.

60
New cards

Comprehensive investigation of cybersecurity threats often utilizes __________ practices to stay ahead of potential risks.

Proactive.

61
New cards

An overview of all active threats filtered by locations and types can be found in a __________ cyber threat map.

Live.

62
New cards

Cybersecurity experts analyze communications from the __________ to detect any potential future threats and vulnerabilities.

Dark web.

63
New cards

To successfully prevent attacks, organizations need an effective __________ to ensure ongoing resilience against evolving threats.

Security posture.

64
New cards

Employing __________ intelligence helps organizations protect against sophisticated attack tactics employed by adversaries.

Threat.

65
New cards

The __________ pays attention to potential vulnerabilities resulting from improperly configured hardware, software, or networks.

Vulnerability assessment.

66
New cards

A company providing cloud services needs to specifically assess the security of its __________ to safeguard critical systems.

Infrastructure.

67
New cards

Conducting continuous __________ assessments helps in identifying and mitigating threats before exploitation occurs.

Vulnerability.