Threats & Vulnerabilities
Security Tools
Monitoring & Detection
Incident Response
Governance & Compliance
100

What is ransomware?

This type of malware locks data and demands payment.

100

What is Wireshark?

This tool captures and analyzes network traffic.

100

What is normal behavior baseline?

This is a baseline used to identify anomalous behavior.

100

What is preparation?

The first step in the incident response process.

100

What is HIPAA?

This federal regulation protects health information in the U.S.

200

What is CVE (Common Vulnerabilities and Exposures)?

A database of known software weaknesses maintained by MITRE.

200

What is ping?

A command-line tool to test host availability.

200

What is Intrusion Detection System?

An Intrusion Detection System (IDS) is a cybersecurity tool or technology that monitors network traffic or system activities for malicious actions or policy violations.

200

What is containment?

This step involves limiting the scope of an incident.

200

What is the European Union (EU)?

GDPR protects the privacy of individuals in this region.

300

What is a zero-day exploit?

Exploiting a system before a patch is released is called this.

300

What is Nmap? 

This tool can identify open ports and services on a host.

300

What is the principle of least privilege?

The security model that gives users the least access necessary.

300

What is eradication or investigation?

Forensic imaging is typically done during this phase.

300

What is a retention policy?

A policy that defines how long logs should be kept.

400

What is social engineering?

An attack that targets the user through deception and manipulation.

400

What is a SIEM (e.g., Splunk)?

Used to aggregate and analyze log data from various sources.

400

What is a DDoS (Distributed Denial of Service)?

This attack floods a network or service to deny access.

400

What is post-incident activity?

Reports and lessons learned happen in this final phase.

400

What is compliance auditing?

Ensuring systems comply with security requirements is called this.

500

What is a penetration test?

A tool used to simulate an attack to identify vulnerabilities.

500

What is Nessus or OpenVAS?

This tool automates vulnerability scans.

500

What is a firewall?

A security appliance that blocks threats based on predefined rules.

500

What is an incident response plan (IRP)?

This document defines the roles, responsibilities, and processes during an incident.

500

What is the NIST Cybersecurity Framework?

A cybersecurity framework developed by NIST.