General Security Concepts
Threats, Vulnerabilities, and Mitigation
Security Architecture
Security Operations
Security Program Management and Oversight
100

This term describes the potential for loss when a threat exploits a vulnerability.

What is Risk?

100

This attack floods a system with traffic to make it unavailable to users.

What is a Denial-of-Service (DoS) attack?

100

This cloud deployment model is owned and operated by a third-party provider and delivers services over the public internet.

What is the Public Cloud model?

100

A company documents who collected digital evidence, when it was collected, and who handled it afterward to maintain admissibility in court.

What is chain of custody?

100

Leadership assigns a senior officer to oversee all security operations, risk assessments, and incident response across the enterprise.

What is appointing a Chief Information Security Officer (CISO)?

200

This security concept ensures data has not been altered without authorization.

What is Integrity?

200

This type of threat actor is motivated primarily by financial gain.

What is a Cybercriminal?

200

This architecture assumes no implicit trust and requires continuous verification of every user and device.

What is Zero Trust Architecture?

200

An administrator configures servers to disable unnecessary services, change default passwords, and apply secure baselines.

What is system hardening?

200

Employees are given guidance on acceptable and prohibited use of corporate resources to protect assets.

What is an acceptable use policy (AUP)?

300

This principle limits users to only the permissions necessary to perform their job functions.

What is the Principle of Least Privilege?

300

This security practice involves regularly scanning systems to identify known weaknesses before attackers exploit them.

What is Vulnerability Scanning?

300

This resiliency concept refers to spreading workloads across multiple systems to optimize resource use and prevent overload.

What is load balancing?

300

The process of isolating compromised systems to prevent the threat from spreading is called this.

What is containment?

300

Quarterly tabletop exercises are conducted to evaluate incident response and business continuity readiness

What are security readiness exercises?

400

These are divided into administrative, technical, and physical categories.

What are Security Controls?

400

Separating a network into smaller isolated segments to limit lateral movement is called this.

What is Network Segmentation?

400

This type of site contains up-to-date copies of systems and data and can take over operations immediately.

What is a hot site?

400

This framework defines the steps: prepare, identify, contain, eradicate, recover, and lessons learned.

What is the incident response lifecycle?

400

Policies are periodically reviewed and updated to reflect changes in technology, regulations, and priorities.

What is policy lifecycle management?

500

This concept ensures a person cannot deny performing an action, often supported by digital signatures.

What is Non-repudiation?

500

This mitigation technique automatically detects and blocks malicious activity on endpoints like laptops and servers.

What is Endpoint Detection and Response (EDR)?

500

A cloud provider delivers virtual machines, networking, and storage resources while the customer manages the operating systems and applications.

What is Infrastructure as a Service (IaaS)?

500

This type of monitoring identifies unusual patterns in network traffic that may indicate a cyberattack.

What is intrusion detection?

500

The organization tracks PCI-DSS, HIPAA, and ISO compliance to meet regulatory requirements.

What is regulatory compliance auditing?