Business Continuity
Cryptography
Securing Devices
Behavioral Security
Wild Card
100

When a system automatically switches to the use of a backup component in the event the primary component becomes unavailable.

What is failover?

100

Encryption in which sender and receiver share a single secret key.

What is symmetric encryption?

100

The site used to manage updates for Windows and associated software.

What is Windows Update?

100

One example of a setting in which the user should have no expectation of privacy.

What are social networking sites, instant messaging, online bulletin boards.

100

Most important assets for most businesses.

What are data and information?

200

A solution for redundancy that addresses the risk of system unavailability due to disk failure.

What is a RAID?

200

This type of encryption cannot be reversed and is often used to store passwords.

What is a cryptographic hash?

200

A file containing corrected or updated code for an application.

What is a patch or update?

200

A set of instructions for carrying out a task in an organization in the approved manner.

What is a procedure (or Standard Operating Procedure)?

200

Information about information: where and when you use an online service, the language you use, the sites you access, keywords from your posts and messages, the kind of device you're using, etc.

What is metadata?

300

A backup plan for carrying out an operation if something goes wrong.

What is a contingency plan?

300

Two ways data at rest may be protected.

What are file level and disk level encryption?

300

Backing up system files as well as data files.

What is a system backup?

300

Using deception to gain access to confidential information.

What is social engineering?

300

Redirects web traffic intended for a legitimate site to a malicious site that looks identical to the legitimate website.

What is pharming?

400

This RAID configuration requires at least three disks and uses striping with parity for fault tolerance.

What is RAID 5?

400

Type of encryption most commonly used for authentication.

What is asymmetric encryption?

400

Every PC should run this security solution to control which internet traffic is permitted, but only one can be installed at any given time.

What is a host firewall?

400

Specifies exactly what can be done with such things as the corporate network, website, computer/systems, and facilities.

What is an Acceptable Use Policy (AUC)?

400

This practice is the only way to be sure that your protections against data loss are working, and it must be carried out only by trusted personnel.

What is testing restoration procedures?

500

In this part of disaster recovery, an organization considers both business needs and dependencies when deciding which systems to restore first.

What is prioritization?

500

Subjects are validated by a digital certificate from a trusted CA, allowing the client to send sensitive information in an asymmetric encryption exchange.

What is Public Key Infrastructure?

500

Two steps to take if you must use a driver that is no longer supported on the OEM's own site.

What are researching third-party sites offering drivers and check for a digital certificate and HTTPS connection?

500

Along with physical destruction, a way to securely dispose of sensitive information on an HDD.

What is using a utility to wipe sensitive data by overwriting it?

500

Three ways cybercriminals may obtain a target's passwords.

What are dictionary attacks, brute force attacks, MITM/on-path, keylogging, shoulder surfing, phishing, pharming.