Cybersecurity
Threats & Attacks
Security Measures & Policies
Incident Response & Recovery
Governance & Legal Frameworks
100

What does the "C" in the CIA Security Triad stand for?

Confidentiality

100

What system monitors network or system activities for malicious activities or policy violations?

Intrusion Detection System (IDS)

100

What software is designed to detect and destroy computer viruses?

Antivirus Software

100

What plan outlines procedures for maintaining business operations during a disaster?

Business Continuity Plan

100

What term refers to the act of obtaining secrets from individuals, competitors, rivals, groups, or governments?

Cyberespionage

200

What is the process of converting data into a coded form to prevent unauthorized access?

Encryption

200

What is a network of private computers infected with malicious software and controlled as a group?

Botnet

200

What authentication method uses unique biological characteristics for identification?

Biometric Authentication

200

What field involves collecting and analyzing computer data to use as evidence in legal cases?

Computer Forensics

200

What is the use of internet-based attacks to cause disruption or fear in society?

Cyberterrorism

300

What is a string of characters used in encryption algorithms to alter data?

Encryption Key

300

What type of attack aims to make a machine or network resource unavailable to its intended users by overwhelming it with traffic?

Distributed Denial-of-Service (DDoS) Attack

300

What policy allows employees to use their personal devices for work purposes?

 Bring Your Own Device (BYOD)

300

What plan focuses on restoring IT systems after a disruption?

Disaster Recovery Plan

300

Which U.S. federal department is responsible for public security, broadly defined to include anti-terrorism, border security, immigration and customs, cyber security, and disaster prevention and management?

Department of Homeland Security (DHS)

400

What network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules?

Firewall

400

What type of malware encrypts the victim's files and demands payment for the decryption key?

Ransomware

400

What is a company that provides outsourced monitoring and management of security devices and systems?

Managed Security Service Provider (MSSP)

400

What term describes the capability to switch to a standby system or network upon failure of the primary system?

Failover

400

What document outlines an organization's security expectations and requirements?

Security Policy

500

What term describes the path or means by which a hacker gains access to a computer or network server?

Attack Vector

500

What is an attack that exploits a previously unknown vulnerability in a computer application?

Zero-Day Attack

500

What advanced firewall includes features like application awareness and intrusion prevention?

Next-Generation Firewall (NGFW)

500

What is a systematic evaluation of security measures within an organization?

Security Audit

500

What U.S. government team coordinates responses to significant cyber incidents?

U.S. Computer Emergency Readiness Team (US-CERT)