Security Basics
Networking Fundamentals
Protocols & Attacks
Operating Systems & Tools
Risk & Vulnerability Management
100

This triad includes confidentiality, integrity, and availability.

What is the CIA Triad?

100

This model has 7 layers including physical, data link, and application.

What is the OSI model?

100

This protocol is used to send emails between servers.

What is SMTP?

100

This type of log tool in Windows helps track security events.

What is Microsoft Event Viewer?

100

The three components required for risk to exist.

What are asset, threat, and vulnerability?

200

A weakness that can be exploited by an attacker.

What is a vulnerability?

200

The protocol that translates domain names into IP addresses.

What is DNS?

200

This attack breaches availability of data by making access impossible when the rightful owners or users need it.

What is Denial of Service (DoS)?

200

This security concept involves regularly updating systems to fix vulnerabilities.

What is patching/hardening/update management?

200

This lifecycle step involves fixing discovered vulnerabilities.

What is remediation?

300

The potential damage when a threat exploits a vulnerability.

What is risk?

300

This protocol automatically assigns IP addresses to devices.

What is DHCP?

300

This insecure protocol sends data in plain text for remote access.

What is Telnet?

300

In Linux, these rules control read, write, and execute access.

What are file permissions (rwx)?

300

What is the formula for quantitative risk analysis?

SLE * ARO = ALE 

400

This type of attack manipulates people instead of systems.

What is social engineering?

400

A technology that allows private IP addresses to access the internet using one public IP.

What is NAT?

400

This protocol is used for network diagnostics like ping.

What is ICMP?

400

This built-in Windows tool protects against malware and viruses.

What is Microsoft Defender?

400
This protocol is used to share STIX data.

What is TAXII?

500

Santiago's brother sees that he answered a question incorrectly on his homework. His brother changes his answer and submits the assignment before Santiago sees. Which CIA Triad element is this a breach of?

What is integrity?

500

This is the successor of IPv4.

What is IPv6?

500

This type of attack targets a specific individual.

What is spear phishing?

500

This Windows feature provides full disk encryption.

What is BitLocker?

500

This type of scan interacts directly with systems but may impact performance.

What is active scanning/reconnaisance?