Event Logging & Operating Systems
Risk Management & Vulnerabilities
Threat Intelligence & CVE
Disaster Recovery & Business Continuity
Incident Response & Forensics
100

Digital records created by operating systems and applications that document system activities and security-related events.

What are Event Logs?

100

Potential loss of systems' or data's confidentiality, integrity, or availability.

What is Risk?

100

Information about threat actors after analysis, processing, and interpretation.

What is Threat Intelligence?

100

The maximum acceptable downtime for a system or business process.

What is RTO (Recovery Time Objective)?

100

The NIST phase where you build an incident response team and gather tools and resources.

What is Preparation?

200

The default event logging system for the Microsoft Windows operating system.

What is Microsoft Event Viewer?

200

An exploitable weakness in a system.

What is a Vulnerability?

200

A database with a unique identifier for each vulnerability in the format CVE-YYYY-######.

What is CVE (Common Vulnerabilities & Exposures)?

200

The maximum acceptable data loss measured in time.

What is RPO (Recovery Point Objective)?

200

The NIST phase where you disconnect systems to contain damage and patch vulnerabilities.

What is Containment, Eradication & Recovery?

300

What controls the interface between applications and hardware?

What is an Operating System?

300

Misconfigurations, missing controls, and exploitable bugs in hardware or software.

What is a Technical vulnerability?

300

A severity score ranging from 0-10 that rates the severity of a vulnerability.

What is CVSS (Common Vulnerability Scoring System)?

300

An alternate site that is fully operational and ready for immediate failover.

What is a Hot Site?

300

A document that tracks evidence from collection to court, including who collected it and how it was stored.

What is Chain of Custody?

400

A type of operating system that requires text-based commands to interact with the computer.

What is a CLI (Command Line Interface)?

400

Lack of awareness training, absent or unenforced policies, and insufficient auditing are examples of this type of vulnerability.

What is an Administrative vulnerability?

400

A machine-readable format using JSON that represents threat intelligence and contains Domain Objects and Relationship Objects.

What is STIX (Structured Threat Information Expression)?

400

A backup strategy that keeps three copies of data on two different types of media with one copy stored off-site. 

Hint: The diagram for it is shaped like a tiered triangle.

What is the 3-2-1 Rule?

400

A seven-phase attack framework consisting of Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives

What is the Cyber Kill Chain?

500

The OS function that controls who has access to what on a system and helps keep data secure.

What is Access Control/Protection?

500

The six-phase continuous process for identifying, assessing, and fixing vulnerabilities in systems.

What is the Vulnerability Management Lifecycle?

500

A four-component framework consisting of Adversary, Capability, Infrastructure, and Victim used to analyze cyberattacks.

What is the Diamond Model?

500

Detailed procedures for responding to specific disasters, including failover procedures and backup requirements.

What is a Disaster Recovery Plan (DRP)?

500

The process of creating bit-perfect copies of evidence using read-only mode and hashing to verify integrity.

What is Forensic Imaging?