General Security
People Security
SIEM
Static Analysis
Dynamic Analysis
100

This is the third step of the risk management life cycle.

What is operating the risk management controls/managing residual risks?

100

This is a security model meant to prevent data leakage of confidential information. 

What is the Bell-LaPadula Security Model?

100

This is what SIEM stands for.

What is Security Incident and Event Management?

100

Statis analysis is a system examination of an abstraction of this. 

What is program state space?

100

Dynamic analysis is the investigation of a running software over one or more of these. 

What is an execution?

200

This is the second phase of the risk management life cycle. 

What is developing a risk management strategy/plan?

200

This is the integrity security model meant to prevent data contamination.

What is the Biba security model?

200

This is one of the three phases of the evolution of SIEM.

What is compliance? 

What is detection?

What is a Security Operations Center (SOC)?

200

Static analysis is sound and incomplete, and is therefore considered this. 

What is decidable?

200

Dynamic analysis leaves these types of paths unexplored. 

What are feasible paths? 

300

These are the two things that individuals/organizations usually care about with respect to their security and privacy. 

What is Availability and Confidentiality/Integrity?

300

This is the security model meant to avoid conflicts of interest by putting dynamic access controls based on subject's previous actions.

What is the Brewer and Nash Security Model/Chinese Wall model?

300

This is the name of the (IETF RFC 5424) protocol for event notification messages.

What is syslog?

300

No static analysis can be sound, complete, and this. 

What is terminating?

300

These are one of the benefits of dynamic analysis over static analysis. 

What is precise data?

What is "no false positive or negatives on a given run"?

What is "the ability to run it on live code"?

What is "no confusion about a path taken"?

400

This is one of the broad categories of risk mangement responses.

What is avoid risky behaviors?

What is transfer risk to third parties?

What is mitigating risks with technical and non-technical controls?

400

This is one of the categories of logical access control.

What is rule-based access control?

What is role-based access control?

What is discretionary access control?

What is attribute-based access control?

What is mandatory access control?

400

These are the two metrics used when estimating proper event capture capabilities.

What are events/time and flows/time?

400

Every static analysis does this through abstraction. 

What is approximating?

400

These are one of the challenges of dynamic analysis. 

What is input dependency?

What is monitoring/instrumentation changing the behavior of the program?

500

These are the two things you must do before you can protect an asset.

What is discovering and classifying the asset?

500

These are the three main categories of authentication.

What is something you know, something you have, and something you are?

500

This is the name of the Iotocol, derived from CISCO NetFlow v9, that provides the ability to collect IP network traffic as it enters or exits an interface.

What is IPFIX?

500
This is the definition of soundness. 
What is reporting all errors?
500

Dynamic analysis cannot show that a program satisfies a particular property, but can detect this. 

What are violations of a property?

M
e
n
u