GENERAL SECURITY CONCEPTS
THREATS, VULNERABILITIES & MITIGATIONS
SECURITY ARCHITECTURE
SECURITY OPERATIONS
SECURITY PROGRAM MANAGEMENT & OVERSIGHT
100

The three core principles of the CIA triad

What are Confidentiality, Integrity, and Availability?

100

This email-based attack tricks victims into revealing sensitive information.

What is phishing?

100

This type of logical network segmentation is commonly used to separate departments.

What is a VLAN?

100

This system manages and secures employee mobile devices.

What is MDM (Mobile Device Management)?

100

This policy outlines acceptable behavior when using organizational IT resources.

What is an Acceptable Use Policy (AUP)?

200

These four categories—technical, managerial, operational, and physical—describe the types of controls used to secure environments.

What are the four categories of security controls?

200

This attack occurs when criminals register misspelled websites to catch mistyped URLs.

What is typosquatting?

200

This type of firewall protects web applications by filtering HTTP/HTTPS traffic.

What is a WAF?

200

This access control technology checks endpoint health before allowing a device on the network.

What is NAC?

200

The formula for this is SLE (Single Loss Expectancy) multiplied by ARO (Annual Rate of Occurrence).

What is ALE (Annualized Loss Expectancy)?

300

This framework includes authentication, authorization, and accounting.

What is AAA?

300

This attack involves inserting malicious queries into backend databases.

What is SQL injection?

300

This hardened gateway system provides secure administrative access to internal networks.

What is a jump server?

300

This technique runs code in an isolated environment to limit potential damage.

What is sandboxing?

300

The four basic strategies for handling risk are accept, mitigate, transfer, and avoid.

What is risk treatment?

400

In asymmetric encryption, this key is used to encrypt a message for someone.

What is the recipient’s public key?

400

This vulnerability exploits timing differences between two operations.

What is a race condition?

400

In cloud computing, this model defines how the provider and customer split security responsibilities.

What is the shared responsibility model?

400

This technology prevents sensitive information from leaving the organization.

What is DLP (Data Loss Prevention)?

400

This metric identifies the maximum amount of downtime a business can tolerate.

What is RTO (Recovery Time Objective)?

500

These provide integrity, authentication, and non-repudiation for digital communications.

What are digital signatures?

500

This type of vulnerability is unknown to the vendor and has no patch available.

What is a zero-day?

500

One system detects attacks; the other detects and blocks them.

What are IDS and IPS?

500

Preparation, detection, analysis, containment, eradication, recovery, and lessons learned make up this process.

What is the incident response lifecycle?

500

This document contains details of all identified risks, mitigation plans, and ownership.

What is a risk register?

M
e
n
u