Boot, OS, & System Security
Attacks, Threat Actors, & Malware Behavior
Cloud, Applications, & Development Security
Threat Hunting, Vulnerability Scanning, & Monitoring
Reporting, Compliance, & Incident Response
100

The most secure server boot verification mechanism.

What is measured boot?

100

Slowly injecting misleading data into a system is this attack.

What is data poisoning?

100

Tool used to apply on-prem security policies to cloud services.

What is a CASB (Cloud Access Security Broker)?

100

Before running a vulnerability scan, IDS/IPS should be configured to treat scanner traffic as this.

What is low-priority scanner events?

100

This report section explains the purpose of the vulnerability assessment and compliance needs.

What is the Background and Context section?

200

This starts the chain of trust in boot security.

What is hardware verification?

200

Accessing unauthorized files due to insecure permissions is this attack.

What is directory traversal?

200

Cloud apps often need protection due to weaknesses in these interfaces.

What are insecure APIs or interfaces?

200

A scan including a port scan and identification of responding software is this type.

What is a noncredentialed scan?

200

Compliance laws relating to electronic protected health information fall under this.

What is HIPAA?

300

Malware that survives OS reinstallation may require this fix.

What is updating UEFI firmware?

300

Zero-day attacks fall under this Johari window category.

What are unknown knowns?

300

Best approach for improving app security and quality in development.

What is adopting the SDLC (Software Development Life Cycle)?

300

Organizations with rotating mobile device checks often use this pair of scan types.

What are agent-based and agentless scans?

300

Presenting evidence with a mismatched serial number may cause this outcome.

What is the case being thrown out?

400

A 3 TB hard drive won’t boot after replacing a 500 GB hard drive because the system uses this older technology.

What is BIOS?

400

Storage decreases during the week then resets on weekends—likely due to this.

What is data exfiltration?

400

Alternative to UBA (User Behavior Analytics) agents that attackers can disable.

What is service-defined protection?

400

To target specific files in a vulnerability scan, configure this scan setting.

What is the data types configuration?

400

Delayed disclosure may cause customers to act on rumors—this issue.

What is misinformation?

500

A user logging into Linux as root despite being a standard user is often due to this Windows-based role.

What is being a Windows administrator?

500

Enabling port mirroring without approval most likely indicates this threat type.

What is an insider threat acting for an external attacker?

500

Implementing CI, CD, and CDE represents this major secure development practice area.

What is secure development best practices?

500

Honeypots + IOA analysis + situational assumptions equals this threat hunting type.

What is hybrid threat hunting?

500

To shorten the time between detecting and neutralizing an attack, organizations focus on this metric.

What is MTTC (Mean Time to Contain)?