Security Principles
Common Threats & Attacks
Access Management
Cryptography
Networking & TCP/IP
100

This three-part framework ensures data confidentiality, integrity, and availability.

What is the CIA Triad?

100

Self-replicating malware that doesn't require human interaction to spread.

What is a worm?

100

The process of verifying that a user is who they claim to be.

What is authentication?


100

The act of converting plaintext into unreadable ciphertext.

What is encryption?

100

The layer of the OSI model responsible for deciding which physical path data will take.

What is Layer 3 (Network Layer)?

200

A weakness in a system that could potentially be exploited by an attacker.

What is a vulnerability?

200

A malicious program disguised as legitimate software.

What is a Trojan horse?

200

The principle that states users should receive only the minimum permissions necessary to perform their job functions.

What is the least-privilege principle?

200

A cryptographic method that uses the same key for both encryption and decryption.

What is symmetric cryptography?

200

The protocol used to map IP addresses to MAC addresses on a local network.

What is ARP (Address Resolution Protocol)?

300

This type of attacker uses their skills for good and operates within legal boundaries.

What is a white hat hacker?

300

An attack where a threat actor intercepts and potentially modifies communication between two parties.

What is an on-path or man-in-the-middle attack?

300

A framework that uses UDP ports 1812 and 1823 for remote authentication and accounting in AAA systems.

What is RADIUS?

300

A cryptographic method that uses two different keys: a public key and a private key.

What is asymmetric cryptography?

300

The successor to IPv4, designed to solve address space limitations.

What is IPv6?

400

A security strategy that implements multiple layers of defensive controls.

What is defense-in-depth?

400

A phishing attack that targets high-value individuals like executives and CEOs.

What is whaling?

400

A security solution that collects logs, correlates them, and notifies administrators about abnormalities or policy breaches.

What is SIEM (Security Information and Event Management)?

400

The process of adding random characters to data before hashing to increase security.

What is salting?

400

This notation allows efficient allocation of IP addresses and uses a forward slash followed by a number (e.g., /24).

What is CIDR (Classless Inter-Domain Routing) notation?

500

A person or group within an organization that poses a threat to the confidentiality, integrity, or availability of that environment.

What is an insider threat?

500

A sophisticated, targeted attack that persists over a long period and is typically carried out by advanced threat actors.

What is an Advanced Persistent Threat (APT)?

500

A security tool that automates responses to detected threats and reduces the need for human intervention.

What is SOAR (Security Orchestration, Automation and Response)?

500

A set of identities, roles, policies, and actions for the creation, use, management, distribution, and revocation of digital certificates.

What is Public Key Infrastructure (PKI)?

500

The three components of Cisco Advanced Malware Protection (AMP) are: AMP for Endpoints, AMP for Networks, and this third component.

What is AMP for Cloud?