Another term for a cyberattack.
What is a hack?
The three states of data.
What are at rest, in transit, and in use?
The definition of risk management.
What is the development of a plan for how the organization will address the various cybersecurity risks it faces?
The browser that allows access to the Dark Web.
What is The Onion Router?
The components of the CIA Triad.
What is Confidentiality, Integrity, and Availability?
The definition of cyber.
What is of, or relating to, or involving computers or computer networks?
What information allows businesses and users to do.
What is make informed decisions?
The 3 aspects of risk.
What are assets (things of value), vulnerabilities of assets, and potential threats that can exploit the vulnerabilities?
The percentage of content on the Internet available via the World Wide Web and the Deep Web
What is 4% (World Wide Web) and 90% (Deep Web)?
The definition of integrity as it relates to the CIA Triad.
What is maintaining the consistency, accuracy, and trustworthiness of data?
The definition of a cyberattack.
An attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or network.
Where data can be stored.
What are computers, desktops, external hard drives, servers, and flash drives?
The definition of risk transfer.
What is an organization shifts the financial liability for loss to an insurance company?
The definition of the Internet.
What is the global communications network over which devices send and receive data?
The difference between authentication and authorization.
What is authentication determines a user's identity, while authorization determines a user's permissions?
The definition of cyberspace.
What is the online virtual computer world, and more specifically, the electronic medium that is used to facilitate online communication?
The difference between data and information.
What is data is a collection of values and has little meaning to a human, while information is data that has been processed and organized, providing context?
The type of black hat hacker that poses the highest risk.
What is hostile nation-states, due to their ability to effectively employ technology & tools against the most difficult of targets?
The components of the Internet.
What is the networking hardware, the physical cabling, and radio transmissions?
The 5 pillars of information assurance.
What are Confidentiality, Integrity, Availability, Authentication, and Non-Repudiation?
The core feature of cyberspace.
What is an interactive and virtual environment for a broad range of participants?
What are the data being stolen, the data being changed, and the data being deleted or held for ransom?
The definition of a zero day attack.
What is an attack on a previously unknown vulnerability in an operating system or software application?
The definition of a URL and what it includes.
What is what you see at the top of your browser page, including the website’s name (domain name) and additional detail telling the website what specific page on the site it is?
The definition of non-repudiation.
What is the assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity so that neither can later deny having processed the information?