
Assets and Threats: Quiz 5

Quiz
•
Computers
•
Professional Development
•
Hard
John Coder
FREE Resource
22 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Security teams spend a lot of time finding vulnerabilities and thinking of how they can be exploited. They do this with the process known as vulnerability management. Vulnerability management is the process of fin_______ and pat________ vulnerabilities. Vulnerability management helps keep assets safe. It's a method of stopping threats before they can become a problem. Vulnerability management is a four step process. The first step is to ide______ vulnerabilities. The next step is to consider potential exp_________ of those vulnerabilities. Third is to prepare de_________ against threats. And finally, the fourth step is to eva_________ those defenses.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The first layer of defense in depth is the peri______ layer. This layer includes some technologies that we've already explored, like usernames and passwords. Mainly, this is a user authentication layer that filters external access. Its function is to only allow access to trusted partners to reach the next layer of defense.
Second, the net______________ layer is more closely aligned with authorization. The network layer is made up of other technologies like network firewalls and others.
Next, is the en___________ layer. Endpoints refer to the devices that have access on a network. They could be devices like a laptop, desktop, or a server. Some examples of technologies that protect these devices are anti-virus software.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
After that, we get to the appl__________ layer. This includes all the interfaces that are used to interact with technology. At this layer, security measures are programmed as part of an appl__________ . One common example is multi-factor authentication. You may be familiar with having to enter both your password and a code sent by SMS. This is part of the appl__________ layer of defense.
And finally, the fifth layer of defense is the data layer. At this layer, we've arrived at the critical data that must be protected, like personally identifiable information. One security control that is important here in this final layer of defense is asset classification.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
One of the most popular libraries of vulnerabilities and exposures is the C?? list. The common vulnerabilities and exposures list, is an openly accessible dictionary of known vulnerabilities and exposures. It is a popular resource.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The CVE list tests four criteria that a vulnerability must have before it's assigned an ID. First, it must be inde_____________ of other issues. In other words, the vulnerability should be able to be fixed without having to fix something else. Second, it must be recognized as a potential security ri__________ by whoever reports it. Third, the vulnerability must be submitted with supporting evi________. And finally, the reported vulnerability can only affect one codebase, or in other words, only one program's source code. For instance, the desktop version of Chrome may be vulnerable, but the Android application may not be. If the reported flaw passes all of these tests, it is assigned a CVE ID.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The NIST National Vulnerabilities Database uses what's known as the common vulnerability scoring system, or CVSS, which is a measurement system that scores the sev____________ of a vulnerability. Security teams use CVSS as a way of calculating the impact a vulnerability could have on a system. They also use them to determine how quickly a vulnerability should be patched.
The NIST National Vulnerabilities Database provides a base score of CVEs on a scale of 0-??. Base scores reflect the moment a vulnerability is evaluated, so they don't change over time. In general, a CVSS that scores below a 4.0 is considered to be low risk and doesn't require immediate attention. However, anything above a 9.0 is considered to be a critical risk to company assets that should be addressed right away.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
OWASP is a nonprofit foundation that works to improve the security of sof______________. OWASP is an open platform that security professionals from around the world use to share information, tools, and events that are focused on securing the web.
One of OWASP’s most valuable resources is the OWASP Top 10. The organization has published this list since 2003 as a way to spread awareness of the web’s most targeted vulnerabilities. The Top 10 mainly applies to new or custom made software. Many of the world's largest organizations reference the OWASP Top 10 during application development to help ensure their programs address common security mistakes.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Mobile and Operating Systems

Quiz
•
Professional Development
20 questions
MS-900 Cloud Concepts 1

Quiz
•
Professional Development
22 questions
OSPF Protocol

Quiz
•
University - Professi...
25 questions
IT RISK AND CONTROL

Quiz
•
Professional Development
22 questions
Sec+ Day1 Security Concepts & Threat Types

Quiz
•
Professional Development
20 questions
NCF Topic 1

Quiz
•
Professional Development
25 questions
Post Assessment Cyber Quiz

Quiz
•
Professional Development
20 questions
Microsoft Outlook Masterclass

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Appointment Passes Review

Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
Grammar Review

Quiz
•
6th - 9th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
5 questions
Setting goals for the year

Quiz
•
Professional Development
14 questions
2019 Logos

Quiz
•
Professional Development
6 questions
GUM Chart Scavenger Hunt

Quiz
•
Professional Development
8 questions
Understanding Government: Limited and Unlimited

Quiz
•
Professional Development
20 questions
tape measure

Quiz
•
Professional Development
24 questions
Street Signs

Quiz
•
9th Grade - Professio...