Domain 1: Security and Risk Management - Security Definitions

10 important questions on Domain 1: Security and Risk Management - Security Definitions

What vulnerabilities (weaknesses) can occur?

1. Software
2. Hardware
3. Procedural
4. Human weakness

What are examples of software vulnerabilities?

1. A service running on a server
2. Unpatched applications or operating system
3. Open port on a firewall

What are examples of hardware vulnerabilities?

1. An unrestricted wireless access point
2. Open port on firewall
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

What are examples of procedural vulnerabilities?

1. Unenforced password management on servers and workstations
2. Lax physical security

What is a threat?

A potential danger that is associated with the exploitation of a vulnerability.

What is meant with a threat agent?

That's the entity that takes advantage of a vulnerability against a company or individual.

Name some examples of an threat agent.

1. An intruder accessing the network through a port on the firewall
2. A process accessing data in a way that violates the security policy
3. Employee circumventing controls in order to copy files to a medium that could expose confidential information.

Name some examples which are demonstrating risk.

1. If a firewall has several ports open, there is a higher likelihood that an intruder will use one to access the network in an unauthorized way.
2.  If users are not educated on processes and procedures, there  is a higher likelihood that an employee will make an unintentional mistake that may destroy data
3. If an Intrusion Detection System (IDS) is not implemented on a network, there is a higher likelihood an attack will go unnoticed until it is too late.

What is meant with a control?

Another word can be a countermeasure. Control is put into place to mitigate (reduce) the potential risk

What cannot be eliminated and why, vulnerability, exposure, threat, threat agent?

The thread agent. You can only prevent the threat agent from exploiting a vulnerability.

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo