General Security Concepts
GRC
Cryptography
Networking
Cloud
100

This is the process of confirming the identity of a user, system, or device.

What is authentication?

100

This type of policy outlines acceptable use of organizational assets such as computers and networks.

What is an Acceptable Use Policy (AUP)?

100

This cryptographic method uses the same key for both encryption and decryption.

What is symmetric encryption?

100

This type of network spans a small geographic area, such as an office building or home.

What is a LAN (Local Area Network)?

100

This cloud service model provides virtualized computing resources such as servers and storage, allowing customers to build and manage their own applications.

What is Infrastructure as a Service (IaaS)

200

This component of the IAAA model ensures that a user’s actions within a system can be uniquely traced back to them.

What is accountability?

200

This U.S. regulation requires healthcare organizations to secure sensitive patient information and enforce privacy protections.

What is HIPAA (Health Insurance Portability and Accountability Act)?

200

This protocol ensures secure data transmission by encrypting communication between a web browser and a server, often indicated by a padlock icon in the address bar

What is HTTPS (Hypertext Transfer Protocol Secure)?

200

This device inspects incoming and outgoing traffic on a network and applies rules to allow or block that traffic.

What is a firewall?

200

This cloud deployment model is shared among multiple organizations with common concerns, such as security or compliance requirement

What is a community cloud

300

This type of security zone is used for testing and developing new applications or systems without risking exposure to the production environment.

What is a sandbox?

300

This process involves prioritizing risks based on their likelihood of occurrence and potential impact, often represented in a matrix format.

What is risk assessment?

300

This symmetric encryption algorithm is known for its use of 128-bit, 192-bit, or 256-bit keys and is the standard for modern encryption.

What is AES (Advanced Encryption Standard)?

300

This type of network is used to isolate devices for additional security, often hosting public-facing services like web or email servers.

What is a DMZ (Demilitarized Zone)?

300

This technology is used to isolate different customers' data and workloads in a multi-tenant cloud environment.

What is virtualization?

400

This type of control, such as firewalls or access controls, is designed to prevent security incidents before they occur.

What is a preventive control?

400

This risk assessment formula is used to calculate the overall risk by multiplying threat likelihood by the impact of the threat

What is Risk = Likelihood × Impact?

400

This component of a Public Key Infrastructure is responsible for issuing, managing, and revoking digital certificates.

What is a Certificate Authority (CA)?

400

This protocol uses port 22 to securely transfer files and manage remote systems.

What is SSH (Secure Shell)?

400

This security solution acts as an intermediary between cloud service users and providers to enforce security policies, such as encryption and access controls.

What is a Cloud Access Security Broker (CASB)?

500

This principle in the zero-trust model enforces strict verification for every device and user attempting to access resources, even if they are within a trusted network zone.

What is least privilege access?

500

This component of risk management focuses on implementing safeguards to reduce risks to an acceptable level and is a key step in maintaining compliance.

What is risk mitigation?

500

This advanced attack leverages weaknesses in hash functions to find two different inputs that produce the same hash output

What is a collision attack?

500

This type of network design uses a centralized controller to manage and optimize data flow, enabling dynamic configuration of network devices.

What is Software-Defined Networking (SDN)?

500

This virtualization technology isolates and runs multiple instances of an operating system on a single host while sharing the host's kernel, ensuring efficient use of resources.

What is containerization

M
e
n
u