The three core principles of the CIA triad
What are Confidentiality, Integrity, and Availability?
This email-based attack tricks victims into revealing sensitive information.
What is phishing?
This type of logical network segmentation is commonly used to separate departments.
What is a VLAN?
This system manages and secures employee mobile devices.
What is MDM (Mobile Device Management)?
This policy outlines acceptable behavior when using organizational IT resources.
What is an Acceptable Use Policy (AUP)?
These four categories—technical, managerial, operational, and physical—describe the types of controls used to secure environments.
What are the four categories of security controls?
This attack occurs when criminals register misspelled websites to catch mistyped URLs.
What is typosquatting?
This type of firewall protects web applications by filtering HTTP/HTTPS traffic.
What is a WAF?
This access control technology checks endpoint health before allowing a device on the network.
What is NAC?
The formula for this is SLE (Single Loss Expectancy) multiplied by ARO (Annual Rate of Occurrence).
What is ALE (Annualized Loss Expectancy)?
This framework includes authentication, authorization, and accounting.
What is AAA?
This attack involves inserting malicious queries into backend databases.
What is SQL injection?
This hardened gateway system provides secure administrative access to internal networks.
What is a jump server?
This technique runs code in an isolated environment to limit potential damage.
What is sandboxing?
The four basic strategies for handling risk are accept, mitigate, transfer, and avoid.
What is risk treatment?
In asymmetric encryption, this key is used to encrypt a message for someone.
What is the recipient’s public key?
This vulnerability exploits timing differences between two operations.
What is a race condition?
In cloud computing, this model defines how the provider and customer split security responsibilities.
What is the shared responsibility model?
This technology prevents sensitive information from leaving the organization.
What is DLP (Data Loss Prevention)?
This metric identifies the maximum amount of downtime a business can tolerate.
What is RTO (Recovery Time Objective)?
These provide integrity, authentication, and non-repudiation for digital communications.
What are digital signatures?
This type of vulnerability is unknown to the vendor and has no patch available.
What is a zero-day?
One system detects attacks; the other detects and blocks them.
What are IDS and IPS?
Preparation, detection, analysis, containment, eradication, recovery, and lessons learned make up this process.
What is the incident response lifecycle?
This document contains details of all identified risks, mitigation plans, and ownership.
What is a risk register?