ACRONYMS
CYBERSECURITY BASICS
TECHNICAL WRITING ESSENTIALS
GRAMMAR AND STYLE
DOCUMENTATION TOOLS
100

This acronym stands for CyberArk’s core solution for managing privileged credentials.

What is PAM (Privileged Access Management)?

100

This type of cyberattack involves tricking individuals into giving out sensitive information

What is phishing?

100

This type of writing explains how to perform a task or process

What is a procedure?

100

This punctuation mark indicates the omission of words in a sentence or a pause in speech.

What is an ellipsis?

100

We use this  tool to create structured content.

What is MadCap Flare?

200

This acronym refers to CyberArk's solution that enforces the least privilege principle for endpoints.

What is EPM (Endpoint Privilege Manager)

200

This term refers to software designed to protect against unauthorized access to a network.

What is a firewall?

200

This formatting style emphasizes conciseness and clarity in technical documents

What is plain language or Lean documentation?

200

This type of sentence provides an explanation and often starts with "because" or "since".

What is a subordinate clause?

200

We use this platform to collaborate on API documentation.

What is Stoplight? 

300

This acronym refers to a CyberArk service designed for managing risk and securing cloud environments.

What is SCA

300

This cybersecurity principle means giving users the minimum level of access they need.

What is the principle of least privilege?

300

This document type helps users to diagnose and resolve issues in software or systems.

What is a troubleshooting guide?

300

This is the term for a verb form used to command or request

What is the imperative mood?

300

This software enables writers to manage large documents with version control.

What is Git?

400

This acronym refers to the CyberArk component that records privileged session activities.

What is PSM (Privileged Session Manager)

400

This is the process of scrambling data to make it unreadable without a decryption key.


What is encryption?

400

This writing methodology structures documentation into reusable chunks that can be assembled in various ways.

What is topic-based authoring?

400

This term describes a sentence that has two or more independent clauses joined without proper punctuation.

What is a run-on sentence?

400

This  language is often used to format documentation in GitHub repositories

What is Markdown?

500

This acronym is used for the CyberArk component that protects access to sensitive data in data centers and public clouds.

What is DPA (Dynamic Privileged Access)?

500

This method of cybersecurity focuses on managing user access to critical information and systems.

What is identity and access management (IAM)?

500

This is the process of reviewing and refining a document to ensure accuracy, clarity, and conciseness.

What is editing?

500

This is the grammatical error of using two or more adjectives where only one is needed.

What is adjective stacking?

500

This tool is used for tracking issues and progress in software development, but it's also utilized by technical writers for managing documentation tasks.

What is JIRA