Pen Testing & Vulnerabilities
Wireless & Network Security
SIEM, Backups & Incident Response
Cloud, Mobile & Virtualization Security
Policies, Risk & Data Protection
100

This team performs offensive operations in security exercises.

Red Team

100

A login page requiring a code before Wi-Fi access.

Captive Portal 

100

SIEM feature that compares logs to known malicious patterns.

Correlation 

100

Manages all devices including IoT, printers, and workstations.

UEM

100

Policy outlining required steps after a cyberattack.

Incident Response Policy

200

Rules that define scope, methods, and timeframes before testing.

Rules of Engagement 

200

A fake access point created to steal credentials.

Evil Twin

200

Correct order: Detection → Analysis → Containment → Eradication → Recovery. What is this process called.

Incident Response Process

200

Creating separate logical networks on a switch.

VLAN

200

Process of limiting permissions for employees to only what they need.

Least Privilege / Access Control

300

Analysis of software during execution to find vulnerabilities.

Dynamic Analysis

300

Displays Wi-Fi signal strength visually across a building.

Heat Map

300

This SIEM feature shows security events and updates on one easy-to-read screen.

Dashboard 

300

Installing apps from outside official app stores.

Sideloading 

300

HIPAA patient data classification.

Regulated Data

400

A paid program for reporting discovered vulnerabilities.

Bug Bounty Program

400

A malicious actor intercepts NFC data and replays it to impersonate a device.

Relay Attack 

400

A site that becomes operational within minutes after disaster.

Hot Site 

400

When multiple customers share the same cloud hardware while keeping their data isolated, this principle is being used.

Multitenancy 

400

Plan used to reverse changes when a deployment fails.

Backout Plan

500

A corrective control that disables abnormal accounts automatically.

Continuous Monitoring / Automated Remediation

500

An email attack exploiting open SMTP servers.

Open SMTP Relay

500

Document ensuring evidence accountability during forensics.

Chain of Custody

500

This policy lets employees use their own phone or tablet for work.

What is BYOD (Bring Your Own Device)?

500

Policy preventing downloading unverified software.

Acceptable Use Policy (AUP)