This is the process of confirming the identity of a user, system, or device.
What is authentication?
This type of policy outlines acceptable use of organizational assets such as computers and networks.
What is an Acceptable Use Policy (AUP)?
This cryptographic method uses the same key for both encryption and decryption.
What is symmetric encryption?
This type of network spans a small geographic area, such as an office building or home.
What is a LAN (Local Area Network)?
This cloud service model provides virtualized computing resources such as servers and storage, allowing customers to build and manage their own applications.
What is Infrastructure as a Service (IaaS)
This component of the IAAA model ensures that a user’s actions within a system can be uniquely traced back to them.
What is accountability?
This U.S. regulation requires healthcare organizations to secure sensitive patient information and enforce privacy protections.
What is HIPAA (Health Insurance Portability and Accountability Act)?
This protocol ensures secure data transmission by encrypting communication between a web browser and a server, often indicated by a padlock icon in the address bar
What is HTTPS (Hypertext Transfer Protocol Secure)?
This device inspects incoming and outgoing traffic on a network and applies rules to allow or block that traffic.
What is a firewall?
This cloud deployment model is shared among multiple organizations with common concerns, such as security or compliance requirement
What is a community cloud
This type of security zone is used for testing and developing new applications or systems without risking exposure to the production environment.
What is a sandbox?
This process involves prioritizing risks based on their likelihood of occurrence and potential impact, often represented in a matrix format.
What is risk assessment?
This symmetric encryption algorithm is known for its use of 128-bit, 192-bit, or 256-bit keys and is the standard for modern encryption.
What is AES (Advanced Encryption Standard)?
This type of network is used to isolate devices for additional security, often hosting public-facing services like web or email servers.
What is a DMZ (Demilitarized Zone)?
This technology is used to isolate different customers' data and workloads in a multi-tenant cloud environment.
What is virtualization?
This type of control, such as firewalls or access controls, is designed to prevent security incidents before they occur.
What is a preventive control?
This risk assessment formula is used to calculate the overall risk by multiplying threat likelihood by the impact of the threat
What is Risk = Likelihood × Impact?
This component of a Public Key Infrastructure is responsible for issuing, managing, and revoking digital certificates.
What is a Certificate Authority (CA)?
This protocol uses port 22 to securely transfer files and manage remote systems.
What is SSH (Secure Shell)?
This security solution acts as an intermediary between cloud service users and providers to enforce security policies, such as encryption and access controls.
What is a Cloud Access Security Broker (CASB)?
This principle in the zero-trust model enforces strict verification for every device and user attempting to access resources, even if they are within a trusted network zone.
What is least privilege access?
This component of risk management focuses on implementing safeguards to reduce risks to an acceptable level and is a key step in maintaining compliance.
What is risk mitigation?
This advanced attack leverages weaknesses in hash functions to find two different inputs that produce the same hash output
What is a collision attack?
This type of network design uses a centralized controller to manage and optimize data flow, enabling dynamic configuration of network devices.
What is Software-Defined Networking (SDN)?
This virtualization technology isolates and runs multiple instances of an operating system on a single host while sharing the host's kernel, ensuring efficient use of resources.
What is containerization