Security Fundamentals

Access & Auth

Network Protections

Operations & Audits

Threats & Defenses

100

his principle of the CIA Triad ensures that information is accessible only to authorized users.

What is Confidentiality?

100

An IT administrator grants a user permissions only to read files in a specific folder, but not to write or delete them. This is an example of what access control concept?

What is least privilege?

100

A company configures its firewall to only allow connections to a specific list of approved websites, blocking all others. This is an example of what network security strategy?

What is whitelisting or default-deny policy?

100

A company policy that mandates annual security awareness training for all employees is an example of what type of security control?

What is an administrative control?

100

This type of malicious software replicates itself and spreads to other computers, often causing damage to data and systems.

What is a worm?

200

Using a digital signature on an email is a common method for ensuring this security property, preventing someone from denying they sent it.

What is non-repudiation?

200

What is the process of setting access rights on a network folder to control what users can do with its contents over the network?

What is access control (or setting permissions)?

200

This type of software is designed to protect a computer or network from unauthorized access by filtering incoming and outgoing network traffic.

What is a firewall?

200

Which type of backup includes all data that has changed since the last full backup?

What is an incremental backup?

200

An attack where an attacker tries to overwhelm a system or network with traffic, making it unavailable to legitimate users.

What is a Denial-of-Service (DoS) attack (or DDoS if distributed)?

300

What is the general term for a security weakness or flaw in software or hardware that an attacker can exploit?

What is a vulnerability?

300

When logging into a secure system, besides your password, you might be asked for a code from your phone or a hardware token. This is an example of what security measure?

What is Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA)?

300

An administrator configures a web server and a database server to run on separate machines to limit the impact of a potential breach. What is this practice known as?

What is network segmentation or isolation?

300

A security tool that aggregates and analyzes log data from various sources to provide a centralized view of security events is commonly known by this acronym.

What is a SIEM (Security Information and Event Management)?

300

his type of social engineering attack tricks users into revealing sensitive information by impersonating a trustworthy entity, often through fake emails or websites.

What is phishing?

400

This concept means that only necessary permissions are granted to a user or system to perform their tasks, nothing more.

What is least privilege?

400

This network authentication protocol uses secret-key cryptography and tickets to provide secure communication over a non-secure network, commonly found in Windows Active Directory.

What is Kerberos?

400

A company needs to ensure that DNS updates on their internal network are authenticated and authorized to prevent malicious redirection. What specific DNS security extension should they implement?

What is DNSSEC (Domain Name System Security Extensions)?

400

What is the most critical first step after installing a new antivirus software application?

What is to update its virus definitions (or signature files)?

400

What term describes malicious software designed to block access to a computer system until a sum of money is paid?

What is ransomware?

500

What are the three core principles that make up the "CIA Triad" in information security?

What are Confidentiality, Integrity, and Availability?

500

What type of attack attempts to guess a password by systematically trying every possible combination of characters?

What is a brute-force attack?

500

A network that is physically isolated from all other networks, including the internet, is known as an?

What is an air-gapped network?

500

In the context of security, what is a "patch management" process primarily designed to do?

What is to fix software vulnerabilities (or bugs) by applying updates?

500

This type of malicious software is designed to gain root-level access to a computer system while remaining hidden from detection.

What is a rootkit?

M
e
n
u