Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
100

The property of information whereby it is recorded, used, and maintained in a way that ensures its completeness, accuracy, internal consistency, and usefulness (1.1)

What is integrity?

100

An event that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the info it processes (2.1)

What is an incident?

100

Ensures that a process cannot be completed by a single person, forcing collusion as a means to reduce insider threats (3.1)

What is segregation (or separation) of duties?
100

The secure alternative port to DNS's port 53 (4.1)

What is port 853? (DNS over TLS, or DoT)

100

A digit representing the sum of the correct digits in a piece of stored or transmitted digital data, against which later comparisons can be made to detect errors in the data (5.1)

What is a checksum?

200

Trade secrets, research, business plans, and intellectual property are all examples of this (1.1)

What is classified (or sensitive) information?

200

The loss of control, compromise, unauthorized disclosure, or any occurrence where someone wrongfully accesses personally identifiable information (2.1)

What is a breach?

200

An information system account with approved authorizations of a privileged user (3.1)

What is a privileged account?

200

An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data travelling between them (4.1)

What is a man-in-the-middle (or on-path) attack?

200

One who performs cryptanalysis, the study of mathematical techniques for attempting to defeat cryptographic techniques and/or information systems security (5.1)

What is a cryptanalyst?

300

The level of risk an entity is willing to assume in order to achieve a potential desired result (1.2)

What is risk tolerance?

300

A security event that constitutes a deliberate security incident in which an intruder gains, or attempts to gain, access to a system or resource without authorization (2.1)

What is an intrustion? 

300

The process of creating, maintaining, and deactivating user identities on a system (3.1)

What is user provisioning?

300

A passive, non-invasive attack to observe the operation of a device, with methods including power monitoring, timing, and fault analysis attacks (4.2)

What is a side-channel attack?

300

A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated (5.2)

What is configuration managament?

400

Management, operational, and technical controls prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information (1.3)

What are security controls?

400

A component of an IR plan that involves training staff, implementing an IR team, planning communication between stakeholders, and developing a policy (2.1)

What is preparation?

400

An entrance to a building or an area that requires people to pass through two doors with only one door opened at a time (3.2)

What is a mantrap?

400

A cloud model in which the cloud provides network access to traditional computing resources such as processing power and storage (4.3)

What is infrastructure as a service? (IaaS)

400

A security policy that addresses employees' personally owned equipment being used for both business and personal matters (5.3)

What is a Bring Your Own Device policy? (BYOD)

500

An organization that develops voluntary international standards in collaboration with its partners in international standardization, the IEC and the ITV (1.4)

What is the International Organization for Standardization? (ISO)

500

A centralized organizational function fulfilled by an information security team that monitors and analyzes network/system events to resolve or prevent issues (2.1)

What is a security operations center? (SOC)

500

These controls are implemented through a tangible mechanism, like walls, locks, fences, or guards (3.2)

What are physical access controls?

500

An agreement between a cloud service provider and a cloud service customer based on cloud-specific terms to set the quality of services delivered (4.3)

What is a cloud-level service agreement? (cloud SLA)

500

A request for your password or login credentials in exchange for some compensation (5.4)

What is a quid pro quo?