Security Principles
Threats & Attacks
Vulnerabilities
CIA Triad & Controls
Security Tools & Practices
100

What does “Least Privilege” mean?

Giving users only the access they need.

100

What type of malware locks your files until a payment is made?

Ransomware

100

What is an unpatched software weakness called?

Vulnerability

100

What do the letters in CIA Triad stand for?

Confidentiality, Integrity, Availability

100

Software that detects and removes malware.

Antivirus

200

This principle ensures actions can be traced to a user.

Accountability

200

This attack floods a server with traffic to shut it down.

DoS (Denial of Service)

200

Default passwords on devices are considered what?

Security Misconfiguration

200

Encryption protects which CIA element?

Confidentiality

200

What is used to filter incoming and outgoing network traffic?

Firewall

300

Principle that ensures systems can continue to function even if parts fail.

Fault Tolerance

300

Tricking someone into giving info through fake emails.

Phishing

300

Weakness in IoT devices lacking updates is called?

IoT Vulnerabilities

300

Backups help ensure which aspect of the CIA triad?

Availability

300

Strong passwords and biometrics are examples of what?

Authentication methods

400

Separating tasks so no user has total control is called what?

Separation of Duties

400

An attacker secretly intercepts communication between two parties.

Man-in-the-Middle

400

Poorly written code that allows outsiders to inject commands.

Code Injection / SQL Injection

400

What protects integrity by detecting unauthorized data changes?

Hashing

400

What security concept uses multiple layers like passwords + MFA?

Defense in Depth

500

The principle that security should be built in from the start of a system, not added later.

Security by Design

500

A long-term, hidden cyberattack targeting a specific organization.

Advanced Persistent Threat (APT)

500

This vulnerability occurs when sensitive data is not encrypted in storage or transit

Data Exposure

500

Access control lists (ACLs) help enforce which CIA principle?

Confidentiality

500

A test where professionals try to hack a system legally.

Penetration Testing

M
e
n
u