Security Basics
Physical
Perimeter
Host
Application
100

The process of using an algorithm to transform data from plaintext to ciphertext in order to protect the confidentiality, integrity, and authenticity of the message.

What is Encryption?

100

Fingerprints or iris scans.

What are Biometric Locks?

100

A type of device that combines many security functions into a single device.

What is an All-In-One Security Appliance?

100

A malicious program that is disguised as legitimate or desirable software.

What is a Trojan Horse?

100

Keeping secrets a secret, also referred to as privacy.

What is Confidentiality?

200

The process of gathering information about an organization.

What is Reconnaissance?

200

Ensures that hardware does not leave the organization's premises without a manager's approval.

What is a Checkout Policy?

200

A remote access connection that uses encryption to securely send data over an untrusted network.

What is a VPN?

200

An attacker trying to correctly guess many passwords or passphrases by systematically calculating every possible combination that could make up a password and testing it to see if it is the correct password.

What is a Brute Force Attack?

200

It disables a user account after a specified number of incorrect login attempts.

What is Account Lockout?

300

Any individual who has authorized access to an organization and either intentionally or unintentionally carries out an attack.

What is an Insider?

300

A reduction in voltage that lasts longer than a few seconds.

What is a Brownout?

300

Impacts system availability by flooding the target system with traffic or requests or by exploiting a system or software flaw.

What is a Denial of Service Attack?

300

A collection of policy settings that enables policy-based administration using Active Directory.

What is a GPO?

300

A folder that subdivides and organizes network resources within a domain.

What is an Organizational Unit?

400

Users or groups are given only the access they need to do their job and nothing more.

What is the Principle of Least Privilege?

400

Offer the best protection for perimeter security because they can actively respond to a variety of threat situations.

What are Security Guards?

400

Grants only limited internet access, but also has some type of firewall to regulate that access.

What is a Guest Network?

400

A person who works independently, either as a consultant or the employee of a firm, to give an objective assessment of the security and controls structure of an organization.

What is an External Auditor?

400

These allow an administrator to bypass a specific hardening rule when an application has a legitimate need.

What is an Exception Rule?

500

One of the primary objectives of an attacker and can be achieved by configuring additional rights to do more than just breaching the system.

What is Escalating Privileges?

500

Encases network cabling within a carrier and enables data to be securely transferred directly between two high-security areas through an area of lower security.

What is Protected Cable Distribution?

500

A network that contains publicly accessible resources and is located between the private network and an untrusted network.

What is a Demilitarized Zone?

500

Something that is designed to execute only under predefined conditions and lays dormant until the predefined condition is met.

What is a Logic Bomb?

500

The deliberate act of creating source or machine code that is difficult for humans to understand.

What is Obfuscation?