Network Security
Cloud Security
Incident Response
Identity and Access Management (IAM)
Endpoint Security
100

What device is typically used to filter incoming and outgoing traffic based on a set of security rules?

Firewall

100

What type of vulnerability occurs when user inputs are not properly sanitized, allowing attackers to inject malicious code into a web application?

SQL Injection

100

What is the first step in the incident response process? (According to NIST)

Preparation

100

What does the acronym MFA stand for in cybersecurity?

Multi-Factor Authentication

100

What common security practice involves regularly updating software on devices to fix vulnerabilities and protect against threats?

Patch Management

200

What is the process of translating private IP addresses to a public IP address called?

Network Address Translation (NAT)

200

What security testing method uses automated tools to scan applications for known vulnerabilities?

Input Validation

200

What is the term for the investigation and analysis of security incidents to understand the extent and impact of the breach?

Forensics

200

What is the process of determining the allowed actions, resources, or data a user is allowed to access based on their permissions or roles. 

Authorization

200

What is the term for the practice of encrypting the hard drive of a laptop or desktop to protect against data theft?

Full Disk Encryption

300

What type of attack involves overwhelming a network with traffic from many sources to limit availability of a service?

Distributed Denial-of-Service (DDoS)

300

Which cloud computing model provides just virtualized computing resources over the internet?

Infrastructure as a Service (IaaS)

300

What does the acronym IOC stand for in incident detection and response?

Indicator of Compromise

300

What type of access control grants users permissions based on their role within an organization?

Role-Based Access Control (RBAC)

300

What is the common term for a technique that isolates running programs to prevent them from affecting other parts of the system?

Sandboxing

400

In network segmentation, what is a separate, isolated subnetwork within an organization's network that houses externally facing services like web servers, email servers, and FTP servers?

Demilitarized Zone (DMZ)

400

What is the term for encrypting data before uploading it to the cloud to ensure it is not readable by the cloud provider?

Client-Side Encryption

400

What is the term for testing an organization's incident response plan through simulated cyberattacks?

Tabletop Exercise

400

What protocol is used to securely transmit authentication credentials, commonly paired with LDAP to strengthen identity verification in enterprise environments?

Secure Lightweight Directory Access Protocol (LDAPS)

400

Which type of attack exploits unknown or unreported vulnerabilities in endpoint devices to gain control or extract data?

Zero-Day Exploit

500

Which protocol suite is typically used to securely transmit information across the internet by encrypting and authenticating traffic between web clients and servers?

TLS/SSL (Transport Layer Security / Secure Sockets Layer)

500

Which concept in cloud security refers to using multiple layers of security controls to protect data, workloads, and applications across the cloud infrastructure?

Defense in Depth

500

What advanced incident response technique uses behavioral analytics and machine learning to detect and respond to threats that bypass traditional security measures?

User and Entity Behavior Analytics (UEBA)

500

What identity federation protocol is commonly used to exchange authentication and authorization data between security domains, typically in cloud environments?

Security Assertion Markup Language (SAML)

500

What is the name of a security solution that continuously monitors endpoint activity to detect and respond to advanced threats like ransomware?

Endpoint Detection and Response (EDR)