Principles of Security
Threats & Attacks
Authentication Methods
Public-Key Encryption
Access Control Basics
100

In computer security, this term refers to a situation where a security flaw is discovered and attackers exploit it before developers can create a patch.

What is a zero-day vulnerability?

100

This common type of attack uses a huge volume of traffic to overwhelm a system or network.

What is a Distributed Denial of Service (DDoS) attack?

100

This basic authentication method requires a user to provide a name and a secret string of characters.

What is Username and Password?

100

In public-key encryption, this key is made available to everyone.

What is the Public Key?

100

This defines the high-level goals, rules, and standards in access control.

What are Access control policies?

200

This principle of the CIA triad ensures that only authorized parties can view the data.

What is Confidentiality?

200

This type of attack involves an attacker trying to guess or use systematic combinations to break into an account.

What is a Brute Force attack?

200

This form of authentication requires users to provide two or more verification methods.

What is Two-Factor Authentication (2FA)?

200

This is the process of converting plaintext into a coded version using a key.

What is Encryption?

200

This commonly used acronym represents the principle that grants users only the access they need to perform their roles.

What is "Least Privilege"?

300

This is the practice of ensuring that a system runs with only the necessary access rights.

What is the Principle of Least Privilege?

300

This type of security threat involves intercepting and relaying messages.

What is Man-in-the-Middle?

300

This authentication method is based on users' unique physical or behavioral characteristics.

What is Biometric Authentication?

300

In digital signatures, this key is used to sign the document.

What is the Private Key?

300

A list of permissions attached to an object is known as this.

What is an Access Control List (ACL)?

400

This type of security model uses labels (like classified, secret, top secret) to determine access.

What is a Mandatory Access Control (MAC) Model?

400

This type of attack relies on flaws in the human element of security, rather than technical vulnerabilities.

What is Social Engineering?

400

When used alone for user authentication, all these techniques are vulnerable.

What are Password-based, Token-based, and Biometric-based?

400

In public-key encryption, if Bob wants Alice to send him a secret message, he provides her with this.  

What is Bob's Public Key?

400

 This type of access control is based on a user's role within an organization.

What is Role-Based Access Control (RBAC)?

500

This principle involves multiple layers of security, ensuring that if one mechanism fails, another can provide protection.

What is Defense in Depth?

500

This sophisticated attack involves a series of malicious activities carried out in stages to avoid detection.

What is an Advanced Persistent Threat (APT)?

500

This cryptographic method provides both authentication and data integrity by producing a fixed-size output from input data of any size.

What is Hashing?

500

In public-key encryption, anyone can use this to encrypt a message, but only the receiver can decrypt it using their private key

What is the receiver's public key?

500

Once authenticated, this process determines what actions, areas, or data the user is permitted to access.

What is Authorization?