Security Concepts
CIA Triad
Authentication
Password Attacks
Methods of Authentication
100

What is the primary goal of computer security?

What is protection?

100

What does the 'C' in the CIA Triad stand for?

What is confidentiality?

100

What is the main purpose of authentication?

What is to prove who you are?

100

What is a dictionary attack?

What is an attack that tests many potential passwords from a list of common words?

100

What is a smart card?

What is a card embedded with a chip used for authentication?

200

Name the three components of the security equation.

What are prevention, detection, and response?

200

What does integrity in cybersecurity mean?

What is protection against unauthorized modification of data?

200

Name one method used for authentication.

What is a password?

200

What does the term 'credential stuffing' mean?

What is using stolen username/password pairs to try to access multiple accounts?

200

Describe what biometrics are in authentication.

What are measurable physical characteristics used to verify identity?

300

What does NIST stand for in the context of cybersecurity?

What is the National Institute of Standards and Technology?

300

Explain the term 'availability' in the CIA Triad.

  1. What is ensuring data is accessible to authorized users when needed?

300

What does access control refer to?

What is what you are allowed to see or access?

300

Define what a hybrid attack is.

What is a combination of dictionary and brute force attacks?

300

What does Single Sign-On (SSO) allow?

What is access to multiple resources with one authentication?

400

What is the purpose of continuous monitoring in cybersecurity?

What is to ensure ongoing security and identify vulnerabilities?

400

Give an example of a breach of confidentiality.

What is the NSA leaks by Edward Snowden?

400

Explain the difference between authentication and identity proofing.

What is authentication verifies identity while identity proofing establishes trust?

400

What is the purpose of a password spray attack?

What is to test a common password against many accounts to avoid lockouts?

400

How does multi-factor authentication enhance security?

What is by requiring more than one method to verify identity?

500

Describe the role of asset management in the NIST Cybersecurity Framework.

  1. What is managing and protecting organizational assets to support security?

500

Describe a scenario that demonstrates a loss of availability.

What is a DDoS attack preventing access to a website?

500

Describe an example of a multi-factor authentication method.

What is using a password along with a one-time code sent to your phone?

500

Explain what a rainbow table is in the context of password attacks.

What is a pre-computed table of hash values used to crack passwords?

500

What is a token in the context of authentication?

What is a hardware device that generates a one-time password?

M
e
n
u