Assets and Threats: Quiz 5

Assets and Threats: Quiz 5

Professional Development

22 Qs

Student preview

quiz-placeholder

Similar activities

security+ (601)

security+ (601)

9th Grade - Professional Development

25 Qs

#01.01 Foundations of Cybersecurity Module 1

#01.01 Foundations of Cybersecurity Module 1

Professional Development

24 Qs

Chapter 3 Quiz

Chapter 3 Quiz

Professional Development

20 Qs

Security+ SY0-601 Domain 1: Attacks, Threats, and V5

Security+ SY0-601 Domain 1: Attacks, Threats, and V5

Professional Development

20 Qs

Endpoint Security for Bootcamp

Endpoint Security for Bootcamp

Professional Development

22 Qs

Day 4 - Security I - Day 3 Review - 1st Review

Day 4 - Security I - Day 3 Review - 1st Review

Professional Development

22 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

AI in Cybersecurity

AI in Cybersecurity

Professional Development

27 Qs

Assets and Threats: Quiz 5

Assets and Threats: Quiz 5

Assessment

Quiz

Created by

John Coder

Computers

Professional Development

Hard

22 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Security teams spend a lot of time finding vulnerabilities and thinking of how they can be exploited. They do this with the process known as vulnerability management. Vulnerability management is the process of fin_______ and pat________ vulnerabilities. Vulnerability management helps keep assets safe. It's a method of stopping threats before they can become a problem. Vulnerability management is a four step process. The first step is to ide______ vulnerabilities. The next step is to consider potential exp_________ of those vulnerabilities. Third is to prepare de_________ against threats. And finally, the fourth step is to eva_________ those defenses.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The first layer of defense in depth is the peri______ layer. This layer includes some technologies that we've already explored, like usernames and passwords. Mainly, this is a user authentication layer that filters external access. Its function is to only allow access to trusted partners to reach the next layer of defense.

Second, the net______________ layer is more closely aligned with authorization. The network layer is made up of other technologies like network firewalls and others.

Next, is the en___________ layer. Endpoints refer to the devices that have access on a network. They could be devices like a laptop, desktop, or a server. Some examples of technologies that protect these devices are anti-virus software.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

After that, we get to the appl__________ layer. This includes all the interfaces that are used to interact with technology. At this layer, security measures are programmed as part of an appl__________ . One common example is multi-factor authentication. You may be familiar with having to enter both your password and a code sent by SMS. This is part of the appl__________ layer of defense.

And finally, the fifth layer of defense is the data layer. At this layer, we've arrived at the critical data that must be protected, like personally identifiable information. One security control that is important here in this final layer of defense is asset classification.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

One of the most popular libraries of vulnerabilities and exposures is the C?? list. The common vulnerabilities and exposures list, is an openly accessible dictionary of known vulnerabilities and exposures. It is a popular resource.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The CVE list tests four criteria that a vulnerability must have before it's assigned an ID. First, it must be inde_____________ of other issues. In other words, the vulnerability should be able to be fixed without having to fix something else. Second, it must be recognized as a potential security ri__________ by whoever reports it. Third, the vulnerability must be submitted with supporting evi________. And finally, the reported vulnerability can only affect one codebase, or in other words, only one program's source code. For instance, the desktop version of Chrome may be vulnerable, but the Android application may not be. If the reported flaw passes all of these tests, it is assigned a CVE ID.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The NIST National Vulnerabilities Database uses what's known as the common vulnerability scoring system, or CVSS, which is a measurement system that scores the sev____________ of a vulnerability. Security teams use CVSS as a way of calculating the impact a vulnerability could have on a system. They also use them to determine how quickly a vulnerability should be patched.

The NIST National Vulnerabilities Database provides a base score of CVEs on a scale of 0-??. Base scores reflect the moment a vulnerability is evaluated, so they don't change over time. In general, a CVSS that scores below a 4.0 is considered to be low risk and doesn't require immediate attention. However, anything above a 9.0 is considered to be a critical risk to company assets that should be addressed right away.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

OWASP is a nonprofit foundation that works to improve the security of sof______________. OWASP is an open platform that security professionals from around the world use to share information, tools, and events that are focused on securing the web.

One of OWASP’s most valuable resources is the OWASP Top 10. The organization has published this list since 2003 as a way to spread awareness of the web’s most targeted vulnerabilities. The Top 10 mainly applies to new or custom made software. Many of the world's largest organizations reference the OWASP Top 10 during application development to help ensure their programs address common security mistakes.

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?