The third leg of the cybersecurity triad: confidentiality, integrity and ____
What is availability
The first step in the social engineering lifecycle.
What is information gathering.
A type of malware that self-replicates and spreads within an infected device.
What is a virus.
Acronym for Personally Identifiable Information.
What is PII.
A disaster type involving wildfires.
What is environmental disaster.
This can damage a system negatively.
What is a threat.
The act of searching garbage for valuable information.
What is dumpster diving
A type of malware that denies access to computer files.
What is ransomware.
Hospitals work to secure this type of information.
What is PHI.
The average, or mean, time to repiar a business resource.
What is MTTR.
A non-malicious hacker who attempts to find system vulnerabilities without the knowledge of the system owner
What is a gray hat hacker.
The act of following an authorized person through a security checkpoint.
What is tailgating.
A type of malware that does not require a host.
What is a fileless virus.
An encryption technique that cannot be reversed.
What is hashing.
An examination of the negative impacts caused by the inability to conduct a business activity.
What is BIA (Business Impact Analysis)
A threat actor who gains unauathorized access to a high-value target for an extended period of time.
What is an APT (Advanced Persistest Threat)
A type of malware that self-replicates and spreads to others devices over a network.
What is a worm.
The risk that remains after an organization implements controls.
What is residual risk.
The desired recovery time from a resource unavailability
What is RTO.
The four types of security controls are: technical, managerial, operational control and _________.
What is Physical Control.
Phishing via phone
A device infected with malware that enables an aattacker to remotelyh control the device.
What is a bot.
The Risk Severity can be calculated from Risk = Likelihood * ?.
What is Impact.
The acceptable data loss amount, measured in time, following an incident.
What is RPO.