21 Questions
What is a vulnerability?
A weakness in design, implementation, operation, or internal control
What is a backdoor in a computer system?
A secret method of bypassing normal authentication or security controls
What is a denial-of-service attack?
An attack that makes a machine or network resource unavailable to its intended users
What is a direct-access attack?
An unauthorized user gaining physical access to a computer
What is eavesdropping?
The act of surreptitiously listening to a private computer conversation (communication)
What is TEMPEST?
A specification by the NSA referring to eavesdropping attacks
What is a multi-vector, polymorphic attack?
A new class of cyber threats that combined several types of attacks and changed form to avoid cybersecurity controls as they spread
What is a vulnerability?
A weakness in design, implementation, operation, or internal control
What is an exploitable vulnerability?
A vulnerability for which at least one working attack or exploit exists
What is a backdoor?
A secret method of bypassing normal authentication or security controls
What is a denial-of-service attack?
A machine or network resource that is unavailable to its intended users
What is a direct-access attack?
An unauthorized user gaining physical access to a computer
What is eavesdropping?
A surreptitious listening to a private computer conversation
What are multi-vector, polymorphic attacks?
A type of cyber threat that changes form to avoid cybersecurity controls
What is Multi-Factor Authentication (MFA)?
A policy that requires users to identify themselves by more than a username and password.
What is the purpose of Multi-Factor Authentication (MFA)?
To enhance organizational security by requiring users to identify themselves by more than a username and password.
What are the factors that can be used in Multi-Factor Authentication (MFA)?
Knowledge, possession, and inherence.
What are one-time passwords (OTPs)?
Passwords generated periodically or each time an authentication request is submitted.
What is Adaptive Authentication or Risk-based Authentication?
A subset of MFA that analyzes additional factors by considering context and behavior.
What is the difference between Multi-Factor Authentication (MFA) and Two-Factor Authentication (2FA)?
2FA restricts the number of factors required to only two, while MFA can be two or more.
What are some examples of Multi-Factor Authentication (MFA)?
Access badges, USB devices, smart cards, and biometrics.
Study Notes
Understanding Multi-Factor Authentication (MFA)
- MFA requires the user to provide two or more verification factors to gain access to a resource.
- MFA is a core component of a strong identity and access management (IAM) policy.
- MFA decreases the likelihood of a successful cyber attack.
- MFA enhances organizational security by requiring users to identify themselves by more than a username and password.
- MFA factors can include knowledge, possession, and inherence.
- One of the most common MFA factors is one-time passwords (OTPs).
- OTPs are generated periodically or each time an authentication request is submitted.
- MFA examples include access badges, USB devices, smart cards, and biometrics.
- Adaptive Authentication or Risk-based Authentication is a subset of MFA that analyzes additional factors by considering context and behavior.
- Adaptive Authentication assigns a level of risk associated with the login attempt.
- MFA is often used interchangeably with two-factor authentication (2FA).
- 2FA restricts the number of factors required to only two, while MFA can be two or more.
"Test Your Knowledge: Understanding Vulnerabilities and Exploits" - Challenge yourself with this quiz that delves into the world of vulnerabilities and exploits. From the definition of a vulnerability to the importance of the CVE database, put your knowledge to the test and see if you can identify common vulnerabilities and their potential exploits. Sharpen your cybersecurity skills with this quiz, filled with essential keywords and information to help you stay ahead of potential threats.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free