Information Security Basics
Threat Actors
Vulnerabilities
Social Engineering
Impacts of Attacks
100

What does the "C" in the CIA Triad stand for?

What is Confidentiality

100

What do we call attackers with limited technical knowledge who use prewritten tools?

Who are Script Kiddies?

100

A system weakness that can be exploited is called a ___________.

What is a vulnerability?

100

Pretending to be someone else to trick a victim is called __________.

What is impersonation?

100

An attacker corrupting files causes what type of impact?

What is data loss?

200

As security increases, what decreases?

What is convenience?

200

Which group is motivated by ideology and makes political statements through cyberattacks?

Who are Hacktivists?

200

Using outdated operating systems or legacy hardware is an example of which vulnerability category?

What are platform vulnerabilities?

200

A targeted phishing attack against executives is called __________.

What is whaling?

200

What is it called when data is stolen and sold to third parties?

What is data exfiltration?

300

Information security protects data when it is manipulated, preserved, or ____________.

What is transmitted?

300

Which type of threat actor is state-sponsored and engages in multiyear campaigns?

Who are State Actors?

300

Not updating a system’s firmware leaves what kind of vulnerability?

What is an unpatched vulnerability?

300

Following someone into a secure building without authorization is __________.

What is tailgating?

300

A loss of system availability impacts what aspect of the organization?

What is productivity/financial loss?

400

Which principle ensures information is correct and unaltered?

What is Integrity?

400

What term describes employees or contractors who misuse their access?

Who are Insiders?

400

What type of vulnerability occurs when a weakness is discovered before developers can patch it?

What is a Zero-Day?

400

Which is NOT a social engineering attack: phishing, hoax, zero-day, or watering hole?

What is Zero-Day?

400

Which impact damages how the public views a company?

What is reputational damage?

500

Which principle ensures authorized users can access information when needed?

What is Availability?

500

What is the term for a government-sponsored, long-term intrusion campaign?

What is an Advanced Persistent Threat (APT)?

500

What’s the risk in working with external vendors that connect directly to your systems?

What is third-party/system integration vulnerability?

500

Looking over someone’s shoulder to steal login info is called __________.

What is shoulder surfing?

500

A large-scale attack shutting down a company’s website affects what principle of the CIA triad?

What is Availability?

M
e
n
u