What security control grants people access to systems based on their permissions? Usually this involves more than one method?
Authentication (Multi-Factor)
What is the section of the policy that stipulates how parties must act and rules they must follow in the event of a claim?
Conditions
What is the digital ledger technology that keeps track of transactions without needing a middleman?
Blockchain
What do we call the data used to teach an AI model—basically the “childhood experiences” of the algorithm?
Training Data
What’s the attack where someone tries to trick you into clicking a malicious link—often claiming you won a prize you absolutely did not win?
Phishing
What is the term for disguising / obfuscating data into randomized alphanumerical strings so that even your nosy coworker Brad can’t read it?
A: Encryption
What is the term for claims that trigger the Privacy Liability insuring agreement that do not stem from bad guys in the system?
Wrongful Collection / Non Breach Privacy
What is the basis of the cryptography that jumbles up readable language and/or secrets into alphanumeric mumbo-jumbo? This is a one-way function that transforms data of any size into a fixed-length, unique digital fingerprint.
Hashing algorithms
What’s the term for when an AI confidently gives you the wrong answer?
Hallucination
Ransomware typically encrypts data until a ransom is paid. What is the term for the key that restores the files?
When a company forces you to change your password every 90 days, what security principle are they trying (and failing emotionally) to enforce?
Password hygiene / credential rotation
What is the coverage that reimburses the insured for issues involving their physical vendor supply chain?
Non-IT Business Interruption
What is the term for a crypto coin’s “digital wallet hash” that you should definitely never store in a sticky note on your monitor?
Private Key
What is the term for specialized AI tools that perform specific tasks?
Agents
When hackers exploit an unknown vulnerability—no patch, no warning—it’s called what?
Zero Day
What is the name of the software that monitors user behavior on corporate machines to ensure bad actors are not in the network?
EDR (Endpoint Detection and Response)
Which insuring agreement refers to a compliance framework with 4 levels based on merchant transaction volume?
PCI-DSS
Who is the alleged inventor of the Bitcoin protocol?
Satoshi Nakamoto
What are the data units—characters, words, or parts of words—used to break down information for neural networks.
Tokens
What’s the type of attack where huge amounts of traffic overwhelm a website?
DDoS
What is the term for endpoint protection that expands beyond just the corporate firewall to the cloud, mobile devices, and servers?
XDR (Extended Detection and Response)
What is the term for a Business Interruption Waiting period that provides reimbursement coverage back to hour zero for a covered claim payment?
Qualifying Period
What’s the name of the crypto mechanism where computers compete to solve puzzles for block rewards?
Proof of Work
What is the underlying technology of AI representing computational models inspired by the human brain to process data, recognize complex patterns, and make predictions?
Neural Networks
Who was the infamous retailer who got breached in 2013 through stolen HVAC contractor credentials?
Target