Chapter 1
Chapter 4.1
Chapter 4.1 & 4.2
Chapter 5.
Chapter 5.
100

A physical object, which a user possesses and controls, that is used to authenticate the user's identity (1.1)

What is a token?

100

An acronym applied to three interrelated elements: a service, a physical server, and a network protocol (4.1) 

What is DNS? (domain name service)

100

A unique logical address that represents the network interface within the network and is useful for maintaining communication when hardware is swapped (4.1)

What is an IP address? (Internet Protocol)

100

Recordings of evidence of activities performed or results achieved which serve as verification that the organization and information system are performing as intended (5.1)

What are records?

100

A security policy that stipulates which information is considered PII and covers other privacy-related issues (5.3)

What is a privacy policy?

200

Any biological characteristics of an individual, such as a fingerprint, hand geometry, voice, or iris patterns (1.1)

What are biometrics?

200

Also called intelligent hubs, these wired devices know the addresses of the devices connected to them and can route traffic to those ports or devices (4.1)

What are switches?

200

These represent data at layer 3 of the Open Systems Interconnection (OSI) model (4.1)

What are packets?

200

The result of a cryptographic transformation of data which, when properly implemented, provides signer non-repudiation and data integrity (5.1)

What is a digital signature?

200

The first stage of change management, wherein a change in procedure or product is sought by a stakeholder (5.3)

What is a request for change? (RFC)

300

The chances of a vulnerability being exploited or a threat occurring (1.2)

What is likelihood (or probability)?

300
An address assigned to every network device, where the first three bytes denote the vendor or manufacturer of the physical network interface (4.1)

What is a media access control (MAC) address?

300

The Internet protocol used to transfer files between hosts (4.1)

What is File Transfer Protocol? (FTP)

300

The altered form of a plaintext messafe so it is unreadable for anyone except the intended recipients (5.1)

What is ciphertext? (5.1)

300

A practice - which can be done through education, training, or awareness activities - to ensure employees know what is expected of them and to weed out carelessness and complacency (5.4)

What is security awareness training?

400

The potential adverse impacts that result from the possibility of unauthorized access, user disclosure, disruption, modification, or destruction of information and/or information systems (1.2)

What is information security risk?

400

A modernization of IPv4 consisting of eight groups of four digits, which addressed weaknesses with IPv4 like length, security, and quality of service (4.1)

What is IPv6?

400

A program that is inserted into a system, usually covertly, with the intent of compromising the CIA of the victim's data, applications, or operating system (4.2)

What is malware?

400

An algorithm that uses the same key in both the encryption and decryption processes (5.1)

What is symmetric encryption?

400

A type of security awareness activity where the goal is to improve understanding, relatability, and application (5.4)

What is education?

500

The internet standards organization - made up of network designers, operators, vendos, and researchers - which defines protocol standards (1.4)

What is the Internet Engineering Task Force? (IETF)

500

The prevention of authorized access to resources or the delaying of time-critical operations (4.1)

What is a (distributed) denial-of-service attack?

500

An attack with the goal of gaining access to a target system through the use of a falsified identity (4.2)

What is spoofing?

500

Monitoring of incoming network traffic (5.1)

What is ingress monitoring?

500

The human equivalent of phishing, where someone impersonates an authority figure or trusted individual in an attempt to gain access to something (5.4)

What is pretexting?

M
e
n
u