Cyber Threat Trends
Supply Chain Security
Security Tools and Controls
Privacy and Data Governance
Incident Preparedness
100

What does the term “vishing” mean?

Social engineering attack where scammers use phone calls to trick individuals into revealing sensitive information like passwords or financial details.

100

What is one example of a supply chain attack?

When a vendor’s systems are compromised and malicious code is inserted into a software update.

100

What does a firewall do?

Blocks or filters unauthorized network traffic.

100

What does PII stand for?

Personally Identifiable Information.

100

What is the main goal of an incident response plan?

Provide a structured approach to handle security incidents quickly and effectively.

200

What is the main goal of ransomware?

Encrypt files and demand payment for decryption.

200

What does code signing verify?

That the software is authentic and untampered, using a digital certificate issued by a trusted authority.

200

What is the primary purpose of an antivirus program?

Protect against traditional computer viruses by detecting and removing them.

(Note: Antimalware tools protect against a broader range of modern threats, including viruses.)

200

What is one example of PII?

Social Security number (SSN), Home address, Phone number, etc.

200

What is the first step in an incident response process?

Identify and confirm the incident.

300

What does the term “spyware” refer to?

Software that secretly collects user information without consent.

300

What is the main reason third-party risk is difficult to manage?

Limited visibility into vendor security practices.

300

What does a password manager help you do?

Store and generate strong, unique passwords securely.

300

What is the principle of data minimization?

To collect only the minimum data necessary for the intended purpose.

300

What is the role of a Cyber Incident Response Team (CIRT)?

Coordinate and manage incident response activities.

400

What is the main purpose of a botnet?

Launch large-scale attacks like DDoS using compromised devices.

400

What is one reason to review a vendor’s incident response plan?

To confirm they can respond effectively to security breaches.

400

What is the main function of a Data Loss Prevention (DLP) tool?

Prevent unauthorized transfer or leakage of sensitive data.

400

Name the European data regulation organization focused on data privacy.

General Data Protection Regulation (GDPR)

400

What is the purpose of a containment step during an incident?

Limit the spread of the threat.

500

What does the term “zero-day vulnerability” mean?

A software flaw unknown to the vendor and exploited before a patch is available.

500

From a security perspective, what is the best reason to keep an inventory of all vendors?

To track and manage potential security risks.

500

What does endpoint detection and response (EDR) software monitor?

Suspicious activity or threats on endpoints like laptops and mobile devices.

500

What is one method to protect PII in storage?

Encryption of data at rest. 

500

What is one reason to conduct a post-incident review?

Identify lessons learned to improve future response.

M
e
n
u