Governance, Risk, and Compliance
Attacks, Threats, Vulnerabilities
Architecture and Design
Implementation
Operations and Incident Response
100

This is the likelihood and impact of a threat.

What is risk?

100

This type of malware locks files and demands payment.

What is ransomware?

100

This network design principle limits access to only what's necessary.

What is least privilege?

100

This principle ensures users only access what they need.

What is least privilege?

100

This is the first step in the incident response process.

What is preparation?

200

This document outlines acceptable use of company resources.

What is an AUP (Acceptable Use Policy)?

200

This social engineering attack involves pretending to be someone trustworthy via Phone.

Vishing

200

This cloud model provides hardware resources only.

What is IaaS (Infrastructure as a Service)?

200

This encryption method uses the same key for encryption and decryption.

What is symmetric encryption?

200

This type of evidence is collected from volatile memory.

What is RAM?

300

This law protects health information in the U.S.

What is HIPAA?

300

This type of scan identifies weaknesses without exploiting them.

What is a vulnerability scan?

300

This technology allows multiple OSes to run on one physical machine.

What is virtualization?

300

This wireless security protocol replaced WEP.

What is WPA2?

300

This tool aggregates logs and alerts.

What is a SIEM?

400

This principle ensures data is only accessible to authorized users.

What is confidentiality?

400

These actors are typically motivated by ideology or political agendas.

What are hacktivists?

400

This zone separates internal networks from external ones.

What is a DMZ (Demilitarized Zone)?

400

This protocol secures web traffic.

What is HTTPS?

400

This technique isolates infected systems.

What is containment?

500

This framework is used for cybersecurity in U.S. critical infrastructure.

What is the NIST Cybersecurity Framework?

500

This type of test simulates a real-world attack without prior knowledge.

What is a black-box penetration test?

500

These systems are built into hardware and often lack security updates.

What are embedded systems?

500

This authentication method uses something you are.

What is biometric authentication?

500

This tool detects malicious activity on a network.

What is an IDS (Intrusion Detection System)?

M
e
n
u