Chapter 1
Chapter 2
Chapter 3
Chapter 4
100

One of the buzzwords of computer system geeks, this one can mean anything; it is generally accepted to mean someone with more skill than an average user, maybe a white hat (good guy) or black hat (bad guy).

Hacker

100

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

Adware

100

_____ state means data actions being performed by “endpoint devices”

Data in-use

100

This Key handling procedure is a temporary status to remove the key from use.

Suspension

200

Attackers who use hacking tools that they don't really understand

Script kiddies

200

The act of digging through trash receptacles to find information that can be useful in an attack.

Dumpster Diving

200

___ manipulates an entire block of plaintext at one time.

Block Cipher

200

This Key handling procedure is an extension to the life of a key about to expire

Renewal

300

A person or element with the power to carry out a threat

Threat actor

300

A phishing attack that automatically redirects the user to a fake site.

Pharming 

300

A symmetric cipher approved by the NIST in 2000 as a replacement for DES and performs three steps on every block (128 bits) of plaintext

Advanced Encryption Standard (AES)

300

A set of rules that dictate what the CAs, RAs, and other entities must do to operate.

Certificate Policy

400

Part of 3 types of information protection(often called CIA) and it is defined as when Information is accessible to authorized users

Availability

400

Computer code that lies dormant until it is triggered by a specific logical event.

Logic Bomb

400

_____ is the most common asymmetric cryptography algorithm

RSA

400

_________is a protocol that can move or copies files in a TCP/IP environment.

File Transfer Protocol (FTP)

500

Part of 3 types of information protection(often called CIA) and it is defined as when only approved individuals may access information

Confidentiality

500

Captures and stores each keystroke that a user types on the computer's keyboard.

Keylogger

500

_____ is a threat actor forces the system to abandon the current higher security mode of operation and instead “fall back” to implementing an older and less secure mode

Downgrade Attack

500

________uses digital certificates to protect email.

S/MIME