Security Architecture
Identity & Access Mgmt
Security & Risk Mgmt
Fed Cyber Policy
Cyber History
100

Name the type of power issue resulting from a prolonged period of low voltage in a data center environment.

What is a Brownout?

100

Mary's company reassigns people to new positions very often. What access control flaw is likely to occur in this type of organization?

What is Privilege Creep?

100

Name the activity designed to test and perhaps bypass a system's security controls

What is Penetration Testing?

100

Name the NIST 800-53 Security Control Family abbreviated "CA".


What is Security Assessment and Authorization?

100

Name the U.S bank that was hacked in 2019 resulting in PII exposure for more than 100 million customers?


What is Capital One?

200

Renee recently received a digital certificate from a trusted certificate authority. What key does it contain?

What is Renee's Public Key?

200

Name the authentication protocols that is not vendor-specific and is widely used to provide centralized authentication services 


What is RADIUS?

200

Name the process that quantifies the impact of disruptions on service delivery, recovery time objectives, and recovery point objectives


What is Business Impact Analysis?

200

Name the third step in the RMF Implementation process.

What is Implement?


200

This English cryptanalyst is famous for deciphering encoded messages during World War II and creating standards for artificial intelligence. He is considered by many to be the father of theoretical computing.

Alan Turing

300

What does MAC stand for with regard to hashing?

What is Message Authentication Code?

300

Name the type of access control system which employs a predefined set of access privileges for an object of a system.


What is MAC (Mandatory Access Control)?

300

Joe recently purchased a cybersecurity insurance policy that will cover his organization’s expenses in the event of a data breach. Name the risk management strategy is Joe pursuing.

What is Risk Transference?

 

300

Name the organization within each Executive Department or Agency which conducts an annual evaluation of the effectiveness of the information security program and practices?


What is the Office of Inspector General (OIG)?

300

Name the Eastern European country that had its power grid shut down on December 23, 2015 as a result of spear phishing

What is Ukraine?

400

Name the security principle on which Bell-LaPadula is based


What is Confidentiality?

400

In Kerberos Authentication, what is the component responsible for issuing the Ticket Granting Ticket?

What is the Authentication Server?

400

What is the formula to calculate Total Risk when conducting Risk Analysis?

Total Risk = Threat x Vulnerability x Asset Value

400

Name the five functions of the Cybersecurity Framework.

What are Identify, Protect, Detect, Respond, and Recover?

400

This English writer and mathematician is known for her work on the Analytical Engine and is considered to be one of the first computer programmers.


Who was Ada Lovelace?

M
e
n
u