What is the CIA triad?
What is Confidentiality, Integrity, Availability
What is the most common form of social engineering?
Where should passwords be stored?
What is a password manager
How many phases are there for incident response?
What are 6
What type of attacker would Russia be?
What is a nation-state actor
What type of malware spreads by itself?
What are worms
What is a key measure for endpoint security?
What is consistent patching
What incident response phase removes the threat from the system?`
What is eradication
How is risk calculated?
What is impact x likelihood
What is a secure workflow?
What is integrating security best practice in daily operations
What type of attack is this: A cybercriminal finds a previously unknown vulnerability in a popular software application and exploits it before a security patch is released.
What is a zero-day vulnerability
What is zero trust?
What is not trusting any user, device, system
What common threat overloads a network?
What is denial of service (DoS)
What are the four steps to risk management?
What is identify risk, assess risk, mitigate risk, and monitor and review
What are the three major areas for secure workflow?
What are access control, data handling, and continuous monitoring
What is the weakest link in cybersecurity?
Who are humans
What is the difference between IDS and IPS?
What is IDS only alerts while IPS blocks attacks
What are the three ways to have MFA?
What is something you know, something you have, something you are
What framework is CatchMark using?
What is the name of a malware that disguises itself as a legitimate download?
What is a Trojan Horse
What are novice attackers called?
What are script kiddies
What is the defense strategy for network security?
What is defense in depth
What framework is used by the European Union and applies to anyone handling and data for a person living within the EU?
What is GDPR (General Data Protection Regulation)
What techniques were used to compromise Cisco in the post we read?
What are vishing and MFA fatigue
What type of encryption has two separate keys for encryption and decryption?
What is asymmetric or public-key encryption