1.4.2 Identifying and Preventing Vulnerabilities

Cards (29)

  • Organizations can improve their network security posture by addressing vulnerabilities through technical, physical, and administrative
  • Regularly patching software is a best practice for addressing software
  • Security awareness training helps address human vulnerabilities.

    True
  • Software vulnerabilities are flaws in software like unpatched operating systems
  • Human vulnerabilities are caused by human error or negligence.
    True
  • Securing physical access is a prevention strategy for hardware
  • Why is it important to implement best practices for network security?
    To address vulnerabilities
  • What are network vulnerabilities?
    Weaknesses in a computer network
  • Hardware vulnerabilities include unsecured ports and outdated hardware.
    True
  • Identifying and addressing vulnerabilities is crucial to prevent attacks
  • Securing physical access to network equipment is a prevention strategy for hardware vulnerabilities.

    True
  • Organizations can improve network security by addressing vulnerabilities through technical, physical, and administrative
  • Software vulnerabilities are flaws or bugs in software
  • What is a human vulnerability in network security?
    Risks caused by human error
  • Order the prevention strategies for software vulnerabilities:
    1️⃣ Regularly patch and update software
    2️⃣ Use antivirus and anti-malware software
    3️⃣ Implement access controls
  • What is one prevention strategy for human vulnerabilities?
    Security awareness training
  • Match the vulnerability type with its best practice:
    Software Vulnerabilities ↔️ Regularly patch and update software
    Hardware Vulnerabilities ↔️ Secure physical access
    Human Vulnerabilities ↔️ Enforce strong password policies
  • What is the purpose of implementing best practices in network security?
    Secure a computer network
  • What is a key practice for addressing hardware vulnerabilities?
    Secure physical access
  • What are network vulnerabilities?
    Weaknesses in a network
  • What is an example of a hardware vulnerability?
    Unsecured ports
  • What is the primary prevention strategy for software vulnerabilities?
    Patch and update software
  • Multi-factor authentication helps prevent human vulnerabilities.

    True
  • Antivirus software is a best practice for addressing software vulnerabilities
  • Email filtering helps prevent phishing scams, addressing human vulnerabilities.

    True
  • What is the purpose of vulnerability scanning tools?
    Detect software flaws
  • Match the tool with its description:
    Vulnerability Scanning Tools ↔️ Detect software flaws
    Firewalls ↔️ Control network traffic
    Intrusion Detection Systems ↔️ Monitor malicious activity
    Encryption ↔️ Protect data in transit
    Access Controls ↔️ Limit user privileges
  • What is a key practice for addressing hardware vulnerabilities?
    Replace outdated hardware
  • Firewalls control and monitor network traffic