What does the CIA triad stand for?
What is Confidentiality, integrity, and availability
Known as an āethical hackerā, this type of hacker is authorized to breach systems to identify and fix security vulnerabilities before malicious people can exploit them.
What is a White Hat hacker?
In Authentication, a smartphone is an example of...?
What is something you have?
This type of attack attempts every possible password combination until the correct one is found, relying on speed rather than stealth.
What is a bruteāforce password attack
The very first phase of the Cyber Kill Chain, it involves researching, identifying, and selecting targets.
What is Reconnaissance?
What is the type of authentication that requires 2 or more verification factors, such as something you know or something you have?
What is Multi-factor Authentication
This way into a computer system lets someone get in without using the normal password, often intentionally left open, allowing them to sneak back in later undetected.
What is a backdoor
This term describes an attacker who has sophisticated tools and expertise to remain in a system undetected for as long as possible.
What is an Advanced Persistent Threat (APT)?
A company has given limited access to certain files & to certain employees for them to complete daily tasks, along with limiting the viewing of these files only during work hours.
What is Principle of Least Privilege