Why attackers can still exploit a MS Office vulnerability patched in 2012

Why attackers can still exploit a MS Office vulnerability patched in 2012

Assessment

Interactive Video

Architecture, Information Technology (IT)

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses the top routinely exploited vulnerabilities from 2016 to 2019, focusing on a 2012 vulnerability that was still being exploited in 2019. It highlights the technical details of the vulnerability, its impact on Office versions, and the challenges in patch management. The importance of revisiting old patches and educating end users on safe practices is emphasized to protect existing systems without necessarily upgrading to new software.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was surprising about the 2012 vulnerability discussed in the video?

It was never patched by Microsoft.

It was a new vulnerability discovered in 2019.

It was still being exploited in 2019 despite being from 2012.

It only affected Office 365.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which library does the 2012 vulnerability exploit in older Office versions?

Microsoft Word Processing Library

Microsoft Excel Data Library

Microsoft Office Security Library

Microsoft Windows Common Control Library

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major issue in patch management discussed in the video?

Patches are always applied immediately.

Patches are often skipped and not revisited.

Patches are only available for new software.

Patches are automatically applied without user consent.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Click-to-Run platform designed to address?

Skipping problematic patches

Enhancing antivirus software

Automatic software upgrades

Improving user interface design

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should organizations do if they still have Office 2010 deployed?

Ignore older patches

Upgrade to Office 365 immediately

Review and apply all skipped updates

Disable all antivirus software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key recommendation for end-user education?

Always open files from unknown sources

Disable all security warnings

Enable editing on all files immediately

Verify the source of files before opening

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should users do when they receive a file from an unknown source?

Delete it without checking

Verify its origin before opening

Forward it to others

Open it immediately