Cloud
App Dev
Authentication and Authorization
Physical Security
Cryptography
100

Something that provides compute power and software.

Platform as a service (PaaS)

100

What enviroment do customers use a product in

Production

100

Gait Analysis is an example of

Biometrics

100

Public computers can be secured by

Cable locks

100

A common system of public ledgers

Blockchain

200

Type of cloud that is for an organizations internal use

Private Cloud

200

This organization keeps tabs on web application vulnerabilities

OWASP
200
Using a google login on a site instead of making an independent account is an example of

Federation

200

Physical controls that keep vehicles from entering unathorized or pedestrian only areas

Bollards

200

sha256 is an example of

A hash

300

Organizations that provide cloud computing resources to a company are called

Managed Service Provider(MSP)

300
This packages your code into an executable

Compiler

300
The rate of accepting unauthoized users on a system is called the
False Acceptance Rate(FAR)
300

How should SSDs be disposed of

Shredding

300

What is a random value added to a hash

A salt

400

A computer that accesses and uses images on a service instead of it's own hardware and software are called

Thin Clients

400

Having this can cause your code to be vulerable over an extended period of time if not updated or removed

Old/Dead code

400

Duo is an example of

MFA / 2FA

400

What should visitors do once they enter a secure facility

Sign in

400

What encryption uses both a public key and private key

Asymmetric

500

Allocating CPU cores, amount of RAM, etc can be referred to as

Resource Allocation

500

Allocating more resources as a programs user base grows is an example of

Scalability

500

Somewhere you are is a

Attribute

500

What can be used to ensure only power transfer over USB

USB Datablocker

500

Currently quantumn encryption can only ensure what part of the CIA triad

Integrity

M
e
n
u