This triad includes confidentiality, integrity, and availability.
What is the CIA Triad?
This model has 7 layers including physical, data link, and application.
What is the OSI model?
This protocol is used to send emails between servers.
What is SMTP?
This type of log tool in Windows helps track security events.
What is Microsoft Event Viewer?
The three components required for risk to exist.
What are asset, threat, and vulnerability?
A weakness that can be exploited by an attacker.
What is a vulnerability?
The protocol that translates domain names into IP addresses.
What is DNS?
This attack breaches availability of data by making access impossible when the rightful owners or users need it.
What is Denial of Service (DoS)?
This security concept involves regularly updating systems to fix vulnerabilities.
What is patching/hardening/update management?
This lifecycle step involves fixing discovered vulnerabilities.
What is remediation?
The potential damage when a threat exploits a vulnerability.
What is risk?
This protocol automatically assigns IP addresses to devices.
What is DHCP?
This insecure protocol sends data in plain text for remote access.
What is Telnet?
In Linux, these rules control read, write, and execute access.
What are file permissions (rwx)?
What is the formula for quantitative risk analysis?
SLE * ARO = ALE
This type of attack manipulates people instead of systems.
What is social engineering?
A technology that allows private IP addresses to access the internet using one public IP.
What is NAT?
This protocol is used for network diagnostics like ping.
What is ICMP?
This built-in Windows tool protects against malware and viruses.
What is Microsoft Defender?
What is TAXII?
Santiago's brother sees that he answered a question incorrectly on his homework. His brother changes his answer and submits the assignment before Santiago sees. Which CIA Triad element is this a breach of?
What is integrity?
This is the successor of IPv4.
What is IPv6?
This type of attack targets a specific individual.
What is spear phishing?
This Windows feature provides full disk encryption.
What is BitLocker?
This type of scan interacts directly with systems but may impact performance.
What is active scanning/reconnaisance?