Chapter 1
Chapter 2
100

This CIA principle ensures that only authorized individuals can access information.

What is Confidentiality?

100

This access control model is commonly used in military

What is Mandatory Access Control (MAC)?

200

social engineering via email or messages.

What is Phishing?

200

this protocol allows users to authenticate once and gain access to multiple applications

What is Single Sign-On (SSO)?

300

These hackers exploit vulnerabilities for personal gain

What is a Black Hat Hacker?

300

This authentication protocol uses a ticket-granting system

What is Kerberos?

400

social engineering over the phone

What is Vishing (Voice Phishing)?

400

SAML's XML-based document to exchange authentication

What is a SAML Assertion?

500

phishing that uses SMS messages

What is Smishing (SMS Phishing)?

500

biometric error that allows unauthorized access

What is False Acceptance Rate (FAR)?