1.1.1
1.1.2
Authentication
1.1.4
Malware
100

The C in the CIA Triad

What is Confidentiality

100

The method of proving who you say you are.

What is Authentication?

100

Pin

What is something you know?

100

When you get a code texted or emailed to you.

What is two-factor authorization?

100

Code that replicates itself.

What is a worm?

200

Protection = ______ + (Detection + Response)

What is Prevention?

200

Determining permissions in AAA.

Access Control

200

Fingerprint

What is something you are?
200

This is how passwords are stored

What is hash?

200

Code that is hidden behind good code in a download.

What is a trojan?

300

The 3 states of data.

What are at rest, in transit, and in use?

300

Usually used with money, this is the way we keep track of and record data used.

What is Accounting?

300

ID Card

What is something you have?

300

This is sometimes added to further disguise a password when stored.

What is salt?

300

When someone can access your device without the device.

What is Remote Access?

400

A power outage is an example of this disruption.

What is Availability?

400

This is when you try all combinations of letters, characters, and symbols to hack a password.

What is brute force?

400

Password

What is something you know?

400

This is a table of all the dictionary passwords hashed.

What is a rainbow table?

400

This malware records user activity and reports it.

What is Spyware?

500

This malware disrupted Iranian Nuclear Facilities.

What is Stuxnet?

500

This is the easiest way to get someone's password.

What is stealing it?

500

Retina

What is something you are?

500

This is how passwords should not be stored.

What is as Plain Text?

500

A multi-component, targetted attack on a company

What is Advanced Persistent Threat (APT)?

M
e
n
u