Identity & Access Management
Operational Visibility & Security Leadership
Technology for Security Operations
Compliance & Vulnerability Scanning
Vulnerability Scoring & Considerations
100

This authentication factor uses something you are, such as fingerprint or retinal scan.

What is biometric authentication

100

The process of monitoring systems for security-related events and generating alerts.

What is security logging and monitoring?

100

This technology uses algorithms to analyze past attack patterns and predict new security threats.

What is threat intelligence

100

Organizations comply with PCI DSS to ensure they securely handle?

What is payment card data

100

The standard framework for scoring vulnerabilities based on severity.

What is CVSS (Common Vulnerability Scoring System)

200

The principle that users should only have access to the minimum information and resources necessary for their roles. 

What is the PoLP

200

A security leader must ensure their team follows an incident response plan. The first step of incident response is?

What is identification

200

A network-based security solution that analyzes traffic for malicious behavior and can block threats.

What is an intrusion prevention system (IPS)

200

HIPAA compliance is required for organizations that handle?

What is protected health information (PHI)

200

A vulnerability’s exploitability is influenced by ease of access and?

What is attack complexity

300

A federation identity system allows users to authenticate once and access multiple systems. A widely used protocol for this is?

What is SAML

300

Security teams use SIEM tools to collect and analyze log data from various sources. SIEM stands for?

What is Security Information and Event Management

300

The practice of isolating critical systems from the rest of the network to reduce attack vectors.

What is network segmentation

300

Automated tools scan systems for security weaknesses. The two main types of scans are credentialed and?

What is non-credentialed scanning

300

This metric evaluates the likelihood that a vulnerability will be exploited.

What is threat likelihood or risk probability

400

This framework ensures that identities and access permissions are continuously monitored and updated in response to risk.

What is Identity Governance & Administration (IGA)

400

A leadership principle emphasizing proactive security measures and integrating security into development workflows.

What is DevSecOps

400

A security operations center (SOC) primarily focuses on?

What is threat monitoring and response

400

The regulation that requires organizations to protect EU citizens’ personal data and privacy.

What is GDPR (General Data Protection Regulation)

400

The term for the amount of time an organization has before an attacker exploits a newly discovered vulnerability.

What is time-to-exploit

500

The protocol used to grant third-party apps limited access to a user's account without exposing their credentials.

What is OAuth?

500

The cybersecurity framework developed by NIST includes five functions: Identify, Protect, Detect, Respond, and?

What is Recover

500

This type of malware encrypts a victim’s files and demands payment for decryption.

What is ransomware

500

The cybersecurity audit process that verifies compliance with a given security framework.

What is an assessment

500

A vulnerability with no available fix or mitigation is known as?

What is a zero-day vulnerability