Name the type of power issue resulting from a prolonged period of low voltage in a data center environment.
What is a Brownout?
Mary's company reassigns people to new positions very often. What access control flaw is likely to occur in this type of organization?
What is Privilege Creep?
Name the activity designed to test and perhaps bypass a system's security controls
What is Penetration Testing?
Name the NIST 800-53 Security Control Family abbreviated "CA".
What is Security Assessment and Authorization?
Name the U.S bank that was hacked in 2019 resulting in PII exposure for more than 100 million customers?
What is Capital One?
Renee recently received a digital certificate from a trusted certificate authority. What key does it contain?
What is Renee's Public Key?
Name the authentication protocols that is not vendor-specific and is widely used to provide centralized authentication services
What is RADIUS?
Name the process that quantifies the impact of disruptions on service delivery, recovery time objectives, and recovery point objectives
What is Business Impact Analysis?
Name the third step in the RMF Implementation process.
What is Implement?
This English cryptanalyst is famous for deciphering encoded messages during World War II and creating standards for artificial intelligence. He is considered by many to be the father of theoretical computing.
Alan Turing
What does MAC stand for with regard to hashing?
What is Message Authentication Code?
Name the type of access control system which employs a predefined set of access privileges for an object of a system.
What is MAC (Mandatory Access Control)?
Joe recently purchased a cybersecurity insurance policy that will cover his organization’s expenses in the event of a data breach. Name the risk management strategy is Joe pursuing.
What is Risk Transference?
Name the organization within each Executive Department or Agency which conducts an annual evaluation of the effectiveness of the information security program and practices?
What is the Office of Inspector General (OIG)?
Name the Eastern European country that had its power grid shut down on December 23, 2015 as a result of spear phishing
What is Ukraine?
Name the security principle on which Bell-LaPadula is based
What is Confidentiality?
In Kerberos Authentication, what is the component responsible for issuing the Ticket Granting Ticket?
What is the Authentication Server?
What is the formula to calculate Total Risk when conducting Risk Analysis?
Total Risk = Threat x Vulnerability x Asset Value
Name the five functions of the Cybersecurity Framework.
What are Identify, Protect, Detect, Respond, and Recover?
This English writer and mathematician is known for her work on the Analytical Engine and is considered to be one of the first computer programmers.
Who was Ada Lovelace?