Chapter 6 Questions Flashcards

(17 cards)

1
Q

What is the OWASP risk formula?

A. Risk = Threat + Impact
B. Risk = Likelihood × Impact
C. Risk = Vulnerability × Threat
D. Risk = Impact – Likelihood

A

Answer: B

Explanation:
OWASP defines risk as the combination of likelihood and impact. Likelihood measures how likely an attack is to occur, while impact measures the damage it would cause. Both must be considered to determine overall risk severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is vulnerability management?

A. Scanning only
B. Full process including remediation
C. Detecting malware
D. Blocking traffic

A

Answer: B

Explanation:
Vulnerability management is a continuous process that includes identifying vulnerabilities, assessing risk, applying patches, and monitoring systems. Scanning is only one part of this process, not the entire lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a vulnerability?

A. Threat
B. Weakness
C. Attack
D. Policy

A

Answer: B

Explanation:
A vulnerability is a weakness in systems, controls, or processes that can be exploited by a threat. It may exist in software, hardware, or organisational procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are many breaches successful?

A. Strong security
B. Unpatched vulnerabilities
C. Encryption
D. Logging

A

Answer: B

Explanation:
Many attacks exploit known vulnerabilities that have not been patched. Studies show most breaches could be prevented with proper vulnerability management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk formula?

A. Threat
B. Likelihood × Impact
C. Logs
D. Detection

A

Answer: B

Explanation:
Risk is calculated by combining likelihood (probability of exploitation) and impact (damage caused). Both must be considered to assess severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Likelihood refers to:

A. Damage
B. Probability of attack
C. Logs
D. Detection

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impact refers to:

A. Probability
B. Damage caused
C. Logs
D. Detection

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat agent factor example?

A. Skill level
B. Logs
C. Encryption
D. Backup

A

Answer: A

Explanation:
Threat agent factors include attacker skill level, motivation, opportunity, and size. These determine how likely a vulnerability is to be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability factor example?

A. Ease of exploit
B. Logs
C. Encryption
D. Backup

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Technical impact includes:

A. Financial loss
B. Loss of integrity
C. Reputation
D. Compliance

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business impact includes:

A. Integrity
B. Financial damage
C. Logs
D. Detection

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is CVE?

A. Score system
B. Vulnerability identifier
C. Firewall
D. IDS

A

Answer: B

Explanation:
CVE (Common Vulnerabilities and Exposures) assigns unique identifiers to vulnerabilities. This allows consistent tracking and referencing across systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is CVSS?

A. ID
B. Severity scoring system
C. Firewall
D. IDS

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is CPE?

A. Device classification
B. Score
C. Log
D. Detection

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is CCE?

A. Config issue identifier
B. Score
C. Log
D. Detection

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Heat map shows:

A. Logs
B. Likelihood vs impact
C. Encryption
D. Detection

17
Q

Vulnerability management includes:

A. Scanning only
B. Full lifecycle (scan, assess, fix)
C. Detection only
D. Encryption