Cybersecurity Mission
Knowing Your Info
Computer Security Incidents
100

This core principle of information security ensures information is available only to authorized persons.

What is confidentiality

100

This type of information must be encrypted when transmitted. 

What is protected Personally Identifiable Information (PII)

100

This device helps when you're concerned about protecting your network from networks-based attacks.

What is anomaly based IDS

200

This core principle of information security ensures information is not accidentally or maliciously changed

What is integrity

200

These types of devices must have whole disk encryption.

What are mobile devices and/or laptops

200

You should use this policy when you want to implement a new device on the network.

What is change management plan

300

This core principle of information security ensures computers and information are effective in supporting the mission.

What is availability


300

This tool can be used on a server to check for weak passwords.

What is John the Ripper

300

This access control list should be placed as close to the source as possible.

What is an extended acl