Domain 4.3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:03 PM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

31 Terms

1
New cards

Vulnerability scan

Automated scan to detect security weaknesses

2
New cards

Application security

Protecting applications from vulnerabilities

3
New cards

Dynamic analysis

testing code while app runs

4
New cards

Package monitoring

Tracking software packages for security issues

5
New cards

Threat feed

Source of current threat intelligence

6
New cards

Open-source intelligence (OSINT)

public info used for intelligence

7
New cards

Proprietary/third-party

Threat data from private organizations

8
New cards

Information-sharing organization

Group sharing security threat data

9
New cards

Dark web

Hidden internet used for anonymous activity

10
New cards

Penetration testing

Simulated attack to find vulnerabilities

11
New cards

Bug bounty program

Rewards for reporting security flaws

12
New cards

System/process audit

Security review of systems or processes

13
New cards

Confirmation

Verifying a vulnerability exists

14
New cards

False positive

Alert for a vulnerability that is not real

15
New cards

False negative

Missed vulnerability during detection

16
New cards

Prioritize

Rank vulnerabilities by risk

17
New cards

Common Vulnerability Scoring System (CVSS)

Standard rating for vulnerability severity

18
New cards

Common Vulnerability Enumeration (CVE)

Unique ID for known vulnerabilities

19
New cards

Vulnerability classification

Categorizing types of vulnerabilities

20
New cards

Exposure factor

Amount of damage a vulnerability may cause

21
New cards

Environmental variables

Environmental factors affecting risk

22
New cards

Industry/organizational impact

Effect of vulnerability on the organization

23
New cards

Risk tolerance

Level of risk an organization accepts

24
New cards

Patching

Applying updates to fix vulnerabilities

25
New cards

Insurance

Financial protection against security incidents

26
New cards

Segmentation

Dividing networks to limit threats

27
New cards

Compensating controls

Alternative controls reducing risk

28
New cards

Exceptions and exemptions

Approved cases where controls are bypassed

29
New cards

Rescanning

Scanning again after fixes

30
New cards

Audit

Review to confirm compliance

31
New cards

Verification

Confirming remediation worked