1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
The two major categories of threats are human and _____
natural
True or False: A threat is any activity that represents a possible danger, with the potential to affect confidentiality integrity or accessibility
True
Which of the following methods can be used to identify threats
Threat Modeling and reviewing historical data
What are some examples of internal threats (select the best answer)
Disgruntled employee, data loss
A(n) ______ assessment is used to identify vulnerabilities within and organization
vulnerability
Who should perform vulnerability assessments
Either internal or external security professionals or both
What is the name of a tool commonly used for vulnerability assessment scans
nessus
an org wants to check compliance with internal rules and guidelines to ensure that existing policies are being followed what should be performed ?
audit
a business wants to know whether its users are granted the rights and permissoins to their job and no more a(n) _____ test should be performed
access control
a business wants to know whether any of the discovered vulnerabilities can be exploited what should be performed
exploit assessment
An organization that is governed by HIPAA wants to know whether it is in compliance what would document the differences between what is required and what is not currently implemented
gap analysis
What sort of IDs is only installed on a specific system
Host based IDs
True or False: An IDs may employ machine learning algorithms to detect unknown malware attacks
True
A _____ assessment identifies and evaluates potential threats
threat
What is the common characteristic between risk and threat assessments
time
Risk = ___ x ___
Threat, Vulnerability
True or False: Natural threats are man made
False
Why are access controls important
To make sure not everyone has admin permissions over something
_________ are a series of events recorded in one or more audit logs
audit logs
____ testing tests individual systems for vulnerabilities
system
The first step of an exploit assessment is to perform a ___ test
vulnerability
A(n) ____ can be used to mitigate SYN floods
IDs