Cybersecurity Basics
Security Controls
Cyber Threats
Networking Fundamentals
Cybersecurity Terminology
100

The principle ensuring data remains unaltered and trustworthy

What is integrity?

100

Policies and procedures controlling security

What are administrative controls?

100

Involves understanding vulnerabilities and threats

What is risk management?

100

Connects devices in a single network

What is a switch?

100

The numerical label assigned to devices in a network

What is an IP address?

200

What ensures information is only accessible to authorized individuals

What is confidentiality?

200

Controls restoring system functionality

What are corrective controls?

200

Provides insights into potential threats

What is threat intelligence?

200

Directs traffic between networks

What is a router?

200

Model representing layers of a network

What is the OSI Model?

300

Systems and data accessibility principle

What is availability?

300

Control type intended to prevent incidents

What are preventative controls?

300

Entities attempting to compromise systems

What are threat actors and adversaries?

300

Assists in network diagnosis and troubleshooting

What are networking tools?

300

Designed to block unauthorized access to networks

What is a firewall?

400

The significance of the CIA in the CIA Triad

What is Confidentiality, Integrity, Availability?

400

Aids in identifying malicious activities

What are detective controls?

400

Mimics adversary behaviuor

What is threat emulation?

400

The regular Internet is also referred to as _______

What is the Clearnet (Surface Web)?

400

The hidden part of the internet often associated with illegal activities

What is the Darknet?

500

Provides an overview of safeguarding measures for data

What is Security Controls Overview?

500

Control type aiming to discourage potential threats

What are deterrent controls?

500

Examples of cyber attacks

What are DDoS and phishing?

500

Part of the internet containing databases and password-protected sites

What is the Deep Web?

500

System detecting unauthorized intrusions

What is an IDS (Intrusion Detection System)?