Search Header Logo
Identifying Vulnerabilities

Identifying Vulnerabilities

Assessment

Presentation

Computers

9th - 12th Grade

Practice Problem

Easy

Created by

Amy Shaw

Used 3+ times

FREE Resource

7 Slides • 6 Questions

1

media

​Lesson Objective: Today, we will analyze common methods to identify vulnerabilities.

2

media

3

Fill in the Blank

T/F: The three methods of application security are static analysis, dynamic analysis, and package monitoring.

4

media

5

Multiple Choice

Static Analysis

1

Analyzing the source code or binary code of an application without executing it.

2

Assessing the application's behavior during runtime.

6

Multiple Choice

Dynamic Analysis

1

Analyzing the source code or binary code of an application without executing it.

2

Assessing the application's behavior during runtime

7

media

8

Fill in the Blank

It is utilizing threat intelligence feeds to stay informed about the lastest cyber threats and proactively understanding the potential ____________(s).

9

media

10

Reorder

Identify the threat intelligence feeds by placing them in order: 1-Dark Web, 2-OSINT, 3-Proprietary, and 4-Information-Sharing

Where cybercriminals may exchange informatin, tools, or compromised data

Gathering information from publicaly available sources

Leveraging intelligence from private or third-party sources

Participating in information-sharing

1
2
3
4

11

media

12

media

13

Open Ended

What are some common methods to identify vulnerabilities?

media

​Lesson Objective: Today, we will analyze common methods to identify vulnerabilities.

Show answer

Auto Play

Slide 1 / 13

SLIDE