Information
Physical Security
Availability
Threats
Internet
100

Random seemingly unrelated facts, numbers, words or statistics.

What is Data?

100

Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....

What is Defense in Depth?

100

What is Access Control?

To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.

100

Who are hackers?

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

100

The secure protocol for web browsing is :

The port number of ssh is :

HTTPS

22

200

Data which is more sensitive than publicly available data and will cause harm if disclosed by unauthorized persons

What is classified data?

200

The list of computers, laptops, software, equipment owned by an organization.

What is Inventory?

200

An identifier that uniquely tracks actions to individuals.

What is an Account? (or Login ID)

200

What is Insider threat?

Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

200

how can you learn open ports on www.domainname.com

use nmap www.domainname.com -A

300

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

What is PII? (or Personally Identifiable Information)

300

The use of personality, inowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

What is Social Engineering?

300

Functional managers manage the internal and external communications infrastructure of an organization.

Who are Network Managers?

300

What is the goal of Reverse Engineering

  • understanding the application code in order to be able to find sensitive data or even tampering with the code.

300

Name one famous email attack

Phishing

400

The collection of all information used to define a person or entity.

What is Identity Information?

400

30-50% of all data loss due to the people already within the organization.

What is Insider Threat?

400


A kind of attack which prevents the usage of a service by overloading the service with excessive requests.

What is Denial of Service?

400

what are the main phases of white-hat hacking?


Information gathering

Scanning

Gaining access

Reporting

400

What is digital forensics is all about?

  • Investigating and analyzing security incidents.

  • Finding traces in network traffic or files metadata

500

A data describing data.

What is Metadata?

500

An electronic means of securing access to a facility or part of a facility through biological identification.

What is Biometric Access Control?

500

It is a word or phrase that verifies that you and only you had access to the account.

What is a Password?

500

How to learn a certain vulnerability in the network?

Using network scanning

500

What is the process of monitoring network traffic?

Sniffing