Appendix C
Memory Tables Answer Key
Chapter 1
Table 1-2 Common Terms and Definitions You Need to Know
Term |
Definition |
Examples |
---|---|---|
Vulnerability |
A weakness in any part of an enterprise that, if exploited, could jeopardize the confidentiality, integrity, or availability of the systems and the data. |
Unpatched software Use of superuser or admin account privileges Open ports and protocols that are not needed Unknown security bugs in software or programming interfaces Unencrypted data on the network Zero-day vulnerability |
Exploit |
Anything that can take advantage of a vulnerability. |
SQL injection attack Cross-site scripting (XSS) Buffer overflow Memory safety violation Input validation error Remote code execution Privilege escalation Zero-day ... |
Get Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.