Risk Management
Web Security
Identity and Access Management
Security Operations
Compliance
100

A potential cause of an unwanted incident.

What is a threat?

100

HTTPS

What protocol secures web traffic?

100

Multi-Factor Authentication.

What is MFA?

(What does it mean, something you know and something you have?)

100

Users should only have access necessary to perform tasks.

What is incident response?

100

GDPR

What law protects EU citizen data?

200

The amount and type of risk an organization is willing to pursue.

What is risk tolerance?

200

A buffer zone between internal and external networks.

What is a DMZ?

200

Role-Based Access Control.

What is RBAC?

(Should roles be clearly defined?)

200

Security Information and Event Management.

What is a SIEM?

200

Health data privacy law in the US.

What is HIPAA

300

Risk that remains after controls are applied.

What is residual risk?

300

Secure Sockets Layer - used to encrypt traffic.

What is SSL?

300

Single Sign-On.

What is SSO?

(Why is it used?)

300

Business Continuity Planning.

What is BCP?

300

Sarbanes-Oxley Act for financial data.

What is SOX?

400

To document all identified risks.

What is the purpose of a risk register?

400

Virtual Private Network for secure remote access.

What is a VPN?

400

Linking digital identities across systems.

What is identity federation?

(Why is it important?)

400

Disaster Recovery Planning.

What is DRP?

400

Standard for securing credit card data.

What is PCI DSS?

500

Investigation or actions taken to prevent risk.

What is due diligence?

500

Intercepting network traffic to analyze it.

What is packet sniffing?

500

Users should only have access necessary to perform tasks.

What is least privilege?

(How does this concept improve network security?)

500

Reviewing logs for unusual or suspicious activity.

What is log analysis?

500

Legal rights to inventions and creative work.

What is intellectual property?