General Security Concepts
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Operations
Security Program Management and Oversight
100

Principle requiring users and services have only the minimum privileges necessary.

What is least privilege?

100

Malware that locks files or systems and demands payment for restoration.

What is ransomware?

100

Network segment that hosts public-facing services and separates them from the internal network.

What is a DMZ (demilitarized zone)?

100

Tool that aggregates logs and correlates events to detect and alert on security incidents.

What is a SIEM (Security Information and Event Management)?

100

Document that defines acceptable employee behavior and constraints for using organizational IT resources.

What is an acceptable use policy (AUP)?

200

Process of converting plaintext into ciphertext to protect confidentiality.

What is encryption?

200

Attack that sends deceptive emails to trick recipients into revealing credentials or clicking malicious links.

What is phishing?

200

Device that enforces access control policies at the network layer by permitting or blocking traffic based on IPs and ports.

What is a firewall?

200

Formal, documented steps taken when a security breach is suspected, starting with identification.

What is incident response?

200

Systematic process to identify, evaluate, and prioritize risks to the organizationSystematic process to identify, evaluate, and prioritize risks to the organization.

What is risk assessment?

300

Security goal focused on ensuring data is accurate and unaltered.

What is integrity?

300

Weakness in code where user input is not properly sanitized, enabling injection of malicious commands or queries.

What is an injection vulnerability (e.g., SQL injection)?

300

Technique that divides a network into logical or physical segments to limit broadcast domains and reduce attack surface.

What is network segmentation (VLANs/microsegmentation)?

300

Practice of capturing volatile system data and preserving evidence for analysis while maintaining chain of custody.

What is digital forensics?

300

Framework or standard that provides requirements for an information security management system (international standard).

What is ISO/IEC 27001?

400

Model that separates duties among multiple people to reduce fraud or error.

What is separation of duties (SoD)?

400

Attack type that overwhelms resources with traffic from many compromised devices.

What is a distributed denial-of-service (DDoS) attack?

400

Cryptographic approach using a public/private key pair for secure key exchange and digital signatures.

What is asymmetric cryptography (public key cryptography)?

400

Routine activity that tests backups by restoring data to verify recoverability.

What is a backup/restore test or disaster recovery drill?

400

Activity to evaluate and ensure third-party vendors meet security requirements, often including questionnaires and audits.

What is vendor or third-party risk management

500

Approach assuming no implicit trust for any user, device, or network—verify continuously.

What is zero trust?

500

Defensive measure that isolates running applications to limit impact if one is compromised.

What is sandboxing or containerization?

500

Design approach that replicates critical services across sites to ensure availability after failures.

What is redundancy or high availability (HA) / disaster recovery architecture?

500

Ongoing activity that proactively hunts for hidden adversaries in an environment using logs, endpoints, and threat intelligence.

What is threat hunting?

500

Continuous program-level activity that aligns security initiatives with business objectives, budgets, metrics, and executive reporting.

What is security governance or security program management