C
Y
B
E
R
100

What is the CIA triad?

What is Confidentiality, Integrity, Availability 

100

What is the most common form of social engineering?

What is phishing
100

Where should passwords be stored?

What is a password manager

100

How many phases are there for incident response?

What are 6

100

What type of attacker would Russia be?

What is a nation-state actor

200

What type of malware spreads by itself?

What are worms

200

What is a key measure for endpoint security?

What is consistent patching

200

What incident response phase removes the threat from the system?`

What is eradication

200

How is risk calculated?

What is impact x likelihood 

200

What is a secure workflow?

What is integrating security best practice in daily operations

300

What type of attack is this: A cybercriminal finds a previously unknown vulnerability in a popular software application and exploits it before a security patch is released.

What is a zero-day vulnerability


300

What is zero trust?

What is not trusting any user, device, system

300

What common threat overloads a network?

What is denial of service (DoS)

300

What are the four steps to risk management?

What is identify risk, assess risk, mitigate risk, and monitor and review

300

What are the three major areas for secure workflow?

What are access control, data handling, and continuous monitoring

400

What is the weakest link in cybersecurity?

Who are humans

400

What is the difference between IDS and IPS?

What is IDS only alerts while IPS blocks attacks

400

What are the three ways to have MFA?

What is something you know, something you have, something you are

400

What framework is CatchMark using?

What is NIST 800-171
400

What is the name of a malware that disguises itself as a legitimate download?

What is a Trojan Horse

500

What are novice attackers called?

What are script kiddies

500

What is the defense strategy for network security?

What is defense in depth

500

What framework is used by the European Union and applies to anyone handling and data for a person living within the EU?

What is GDPR (General Data Protection Regulation)

500

What techniques were used to compromise Cisco in the post we read?

What are vishing and MFA fatigue

500

What type of encryption has two separate keys for encryption and decryption?

What is asymmetric or public-key encryption

M
e
n
u