
Assets and Threats: Quiz 5
Authored by John Coder
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Security teams spend a lot of time finding vulnerabilities and thinking of how they can be exploited. They do this with the process known as vulnerability management. Vulnerability management is the process of fin_______ and pat________ vulnerabilities. Vulnerability management helps keep assets safe. It's a method of stopping threats before they can become a problem. Vulnerability management is a four step process. The first step is to ide______ vulnerabilities. The next step is to consider potential exp_________ of those vulnerabilities. Third is to prepare de_________ against threats. And finally, the fourth step is to eva_________ those defenses.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The first layer of defense in depth is the peri______ layer. This layer includes some technologies that we've already explored, like usernames and passwords. Mainly, this is a user authentication layer that filters external access. Its function is to only allow access to trusted partners to reach the next layer of defense.
Second, the net______________ layer is more closely aligned with authorization. The network layer is made up of other technologies like network firewalls and others.
Next, is the en___________ layer. Endpoints refer to the devices that have access on a network. They could be devices like a laptop, desktop, or a server. Some examples of technologies that protect these devices are anti-virus software.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
After that, we get to the appl__________ layer. This includes all the interfaces that are used to interact with technology. At this layer, security measures are programmed as part of an appl__________ . One common example is multi-factor authentication. You may be familiar with having to enter both your password and a code sent by SMS. This is part of the appl__________ layer of defense.
And finally, the fifth layer of defense is the data layer. At this layer, we've arrived at the critical data that must be protected, like personally identifiable information. One security control that is important here in this final layer of defense is asset classification.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
One of the most popular libraries of vulnerabilities and exposures is the C?? list. The common vulnerabilities and exposures list, is an openly accessible dictionary of known vulnerabilities and exposures. It is a popular resource.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The CVE list tests four criteria that a vulnerability must have before it's assigned an ID. First, it must be inde_____________ of other issues. In other words, the vulnerability should be able to be fixed without having to fix something else. Second, it must be recognized as a potential security ri__________ by whoever reports it. Third, the vulnerability must be submitted with supporting evi________. And finally, the reported vulnerability can only affect one codebase, or in other words, only one program's source code. For instance, the desktop version of Chrome may be vulnerable, but the Android application may not be. If the reported flaw passes all of these tests, it is assigned a CVE ID.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The NIST National Vulnerabilities Database uses what's known as the common vulnerability scoring system, or CVSS, which is a measurement system that scores the sev____________ of a vulnerability. Security teams use CVSS as a way of calculating the impact a vulnerability could have on a system. They also use them to determine how quickly a vulnerability should be patched.
The NIST National Vulnerabilities Database provides a base score of CVEs on a scale of 0-??. Base scores reflect the moment a vulnerability is evaluated, so they don't change over time. In general, a CVSS that scores below a 4.0 is considered to be low risk and doesn't require immediate attention. However, anything above a 9.0 is considered to be a critical risk to company assets that should be addressed right away.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
OWASP is a nonprofit foundation that works to improve the security of sof______________. OWASP is an open platform that security professionals from around the world use to share information, tools, and events that are focused on securing the web.
One of OWASP’s most valuable resources is the OWASP Top 10. The organization has published this list since 2003 as a way to spread awareness of the web’s most targeted vulnerabilities. The Top 10 mainly applies to new or custom made software. Many of the world's largest organizations reference the OWASP Top 10 during application development to help ensure their programs address common security mistakes.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Réseaux 1
Quiz
•
Professional Development
18 questions
Evaluación AUTH-ACCESS Attacks - Website Hacking
Quiz
•
Professional Development
18 questions
HC Análisis y reconocimiento de la interfaz (V2)
Quiz
•
Professional Development
20 questions
Avaliação - HTML e CSS
Quiz
•
Professional Development
20 questions
1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni
Quiz
•
University - Professi...
20 questions
Linguaxes de marcas: HTML
Quiz
•
Professional Development
20 questions
Computers
Quiz
•
7th Grade - Professio...
18 questions
UD 1. La web social
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development