Host
Network
Policies, Procedures, and Awareness
Application
Data
100

A type of virus that conceals its presence by intercepting system requests and altering service outputs.

What is Stealth?

100

The single greatest threat to network security

What are employees?

100

An attacker pretending to be from a trusted organization sends an email asking users to access a website to verify personal information.

What is Phishing?

100

The term for the process of validating a subject's identity.

What is Authentication?

100

Running a hard disk through a disk shredder, physically destroying the drive.

What is Shredding?

200

It monitors the actions you take on your machine and sends the information back to its originating source.

What is Spyware?

200

A type of attack that is most likely to succeed with communications between instant messaging clients.

What is Sniffing?

200

An attacker gathers personal information about the target individual, who is a CEO.

What is Whaling?

200

The type of password that uses maryhadalittlelamb.

What is Pass phrase?

200

The removal of sensitive data, ensuring that the data cannot be reconstructed by any known technique.

What is Purging?

300

Undetectable software that allows administrator-level access.

What is Rootkit?

300

A type of security threat exists when this user account is used to perform administrative functions.

What is Privilege escalation?

300

The type of attack in which a user distributes hoax virus information emails. 

What is Social Engineering Attack?

300

The most important aspect of a biometric device?

What is Accuracy?

300

The attack that takes the longest amount of time to complete.

What is Brute force attack?

400

Another name for a logic bomb.

What is Asynchronous attack?

400

Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode.

What is MAC Flooding?

400

An attacker convinces personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.

What is Masquerading?

400

Another term for the type of login credentials provided by a token device.

What is One-time password?

400

One of the data destruction techniques that uses a punch press or hammer system to crush a hard disk.

What is pulverizing?

500

The primary distinguishing characteristic between a worm and a logic bomb.

What is Self-replication?

500

A typical goal of MAC spoofing.

What is Bypassing 802.1x port-based security?

500

A program writing development modes that uses the  method that allows for optimal control over coherence, security, accuracy, and comprehensibility?

What is Structured programming?

500

An access control model that is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject.

What is Attribute-Based Access Control?

500

A form of Two cryptographic attack exploits, two different messages or files produce the same hashing digest, then a collision has occurred.

What is Birthday attack?