Domain 1:General Security Concepts
Domain 2:Threats, Vulnerabilities, and Mitigations
Domain 3:Security Architecture
Domain 4:Security Operations
Domain 5:Security Program Management and Oversight
100

This process ensures evidence is tracked and protected from collection to presentation in court.

What is a chain of custody?

100

This is the first step attackers take to gather information before trying to break into a system.

What is reconnaissance?


100

This type of access control lets users decide who can access the files and resources they own.

What is discretionary access control (DAC)?

100

This command helps you find the IP address of a website or domain name.

What is nslookup?

100

This policy explains how a company should protect and use customer information.

What is a data privacy policy?

200

This type of control includes policies and procedures created to guide an organization’s security.

What is a managerial control?

200

This type of malware locks or encrypts your files and demands money to unlock them.

What is ransomware? OR What is crypto-ransomware?

200

A dual-homed gateway typically has this many network interfaces.

What is 2?

200

This document logs who accessed evidence and when, helping ensure its integrity.

What is a chain of custody document?

200

This policy tells employees what they can and cannot do with company computers and devices.

What is an acceptable use policy (AUP)?

300

This team watches over an organization’s systems and responds to security threats as they happen.

What is a Security Operations Center (SOC)?

300

This happens when employees use apps or tools at work without telling the IT department.

What is shadow IT?

300

This firewall function filters data packets to determine whether they are allowed through.

What is packet filtering?

300

This fast and effective malware recovery method restores a system to a clean state.

What is re-imaging the computer?

300

This risk strategy moves the responsibility for a risk to someone else, like buying insurance.

What is risk transference?

400

This type of risk analysis uses numerical values, such as asset value, exposure factor, and annualized rate of occurrence, to calculate potential financial loss.

What is quantitative risk analysis?

400

In this type of attack, a hacker forces a system to use a weaker, older version of security to make it easier to break in.

What is a downgrade attack?

400

This cloud service lets you use software through the internet without installing it on your computer.

What is Software as a Service (SaaS)?

400

This MFA factor uses the device's geographic location to authenticate users.

What is somewhere you are?

400

This is the risk that remains after you put security measures in place.

What is residual risk?

500

This type of security protects buildings, rooms, and equipment from unauthorized access.

What is physical security?

500

In this type of attack, a hacker sends harmful code into a program to trick it into doing something it shouldn’t.

What is an injection attack?

500

This advanced security device offers Layer 7 filtering, can block threats, check apps, and control traffic based on users.

What is a Next Generation Firewall (NGFW)?

500

This security tool watches network traffic and alerts you if it sees suspicious activity, but does not take direct action to block it.

What is an Intrusion Detection System (IDS)

500

This document lists all the risks a company faces, who is responsible, and how to handle them.

What is a risk register?