Risk and Risk Management
Information Security
Hacking and Threats
Miscellaneous
100

A process used by businesses to identify and evaluate the risks they face and the efectiveness of their controls to mitigate that risk.

What is RCSA?

100
This is a type of policy describing the amount of time that a company designates how long different types of data is held. 

What is data retention?

100

This person performs malicious acts on computers and/or networks for their personal gain.

What is a hacker?

100

A type of social engineering where an attacker sends a fraudulent email designed to trick a human victim into revealing sensitive information to the attacker.

What is Phishing?

200

A flaw or weakness in a system’s design or operation that could be exploited to attack the system.

What is a vulnerability?

200

The term describing a penetration test where the tester has no credentials or inside knowledge. 

What is a black box pen test?

200

It is the general term for a program used by hackers to figure out account credentials. 

What is a password cracker?

200

It was one of Obama's biggest contributions to cybersecurity during his presidency. 

What is NIST CSF?



300

The type of risk posed before any treatment.

What is inherent risk?

300

A document that contains a set of rules and standards that a company publishes to protect its assets.

What is a Policy?

300

This is a simulated attack designed to challenge and test an organization's defenses, incident response capabilities, preparedness, and overall resilience. The organization is largely unwitting.

What is personal data or Personally Identifiable Information (PII)?

300

This process converts plaintext data into an alternative form known as ciphertext, making the message unreadable.

What is Encryption?

400

The type of risk after risk treatment.

What is residual risk?

400

Requires users to provide more than one piece of information that includes a combination of something the user knows --like a password or PIN; something the user has -- like an ID card, security token or smartphone; or something the user is --biometrics.

What is two-factor authentication/multi-factor authentication?

400

He was one of the world's most famous hackers, and he was KnowBe4's Chief Hacking Officer.

Who was Kevin Mitnick?

400

This is the company that annually provides the most comprehensive breach analysis report in the world, the DBIR.


What is Verizon?

500

This is a set of tools and services that provides a holistic view of an organization's information security. 

What is Security Information and Event Management? (SIEM)

500

Confidentiality, Integrity, Availability

What is the CIA Triad?

500

An attack where a bad actor takes control of a company's network and doesn't relinquish control until money is paid to the bad actor.

What is ransomware?

500

It has "HTTPs”, and it has a lock showing on the URL.

What is a secure website?