🦠
⚠️
🔐
🧱
☁️
100

A general term used to describe software designed to damage, disrupt, or gain unauthorized access to a system.

malware

100

This is the term for attempting to acquire sensitive information by pretending to be a trustworthy entity.

phishing

100

The act of converting data into an unreadable format to protect its confidentiality.

encryption

100

A copy of a VMs disk file at a given point in time.

snapshot

100

A network of remote servers hosted on the Internet to store, manage, and process data.

cloud computing

200

This type of malware disguises itself as legitimate software to trick users into installing it.

trojan horse

200

An insider threat comes from which source?

employee or trusted individual within the organization

200

Symmetric encryption uses the same key to encrypt and decrypt while this type of encryption uses a key pair.

asymmetric

200

What software creates and runs virtual machines?

hypervisor

200

IaaS, PaaS, and SaaS are __________________?

cloud service models

300

This malware locks users out of their system or data and demands payment to restore access.

ransomware

300

Term used to describe the manipulation of people into giving up confidential information.

social engineering

300

This cryptographic concept ensures that data has not been altered in transit.

hashing

300

Also known as the bare-metal hypervisor, which type runs directly on the host's hardware

Type 1 hypervisor

300

A model defining responsibilities are shared between the cloud provider and the customer. 

shared responsibility model

400

This type of malware can replicate itself and spread across systems without human interaction.

worm

400

Fake emails targeting specific individuals.

spear phishing

400

This cryptographic protocol enables secure communication over an insecure network and is widely used in HTTPS.

TLS [Transport Layer Security]

400

A lightweight alternative to traditional virtual machines, often used in DevOps environments. 

container (e.g., Docker)

400

A cloud deployment model which provides the most control over infrastructure and security

private cloud

500

Name the stealthy type of malware that provides continuous, privileged access to a system while actively hiding its presence.

rootkit

500

APT. Not to be confused with an appt.

Advanced Persistent Threat

500

This type of cryptography is considered more efficient than RSA do to a smaller key size, reducing computational overhead, while providing the same level of security.

Elliptic Curve Cryptography [ECC]

500

A technique used in virtualization to allow a host operating system to reclaim memory from VMs, when the VM is not using it.

Memory Ballooning

500

Where data is physically stored and the legal regulations that apply to it.

data residency [concerns]

M
e
n
u