Domain 1: Security and Risk Management - Security Definitions
10 important questions on Domain 1: Security and Risk Management - Security Definitions
What vulnerabilities (weaknesses) can occur?
2. Hardware
3. Procedural
4. Human weakness
What are examples of software vulnerabilities?
2. Unpatched applications or operating system
3. Open port on a firewall
What are examples of hardware vulnerabilities?
2. Open port on firewall
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
What are examples of procedural vulnerabilities?
2. Lax physical security
What is a threat?
What is meant with a threat agent?
Name some examples of an threat agent.
2. A process accessing data in a way that violates the security policy
3. Employee circumventing controls in order to copy files to a medium that could expose confidential information.
Name some examples which are demonstrating risk.
2. If users are not educated on processes and procedures, there is a higher likelihood that an employee will make an unintentional mistake that may destroy data
3. If an Intrusion Detection System (IDS) is not implemented on a network, there is a higher likelihood an attack will go unnoticed until it is too late.
What is meant with a control?
What cannot be eliminated and why, vulnerability, exposure, threat, threat agent?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding