What does the "C" in the CIA Security Triad stand for?
Confidentiality
What system monitors network or system activities for malicious activities or policy violations?
Intrusion Detection System (IDS)
What software is designed to detect and destroy computer viruses?
Antivirus Software
What plan outlines procedures for maintaining business operations during a disaster?
Business Continuity Plan
What term refers to the act of obtaining secrets from individuals, competitors, rivals, groups, or governments?
Cyberespionage
What is the process of converting data into a coded form to prevent unauthorized access?
Encryption
What is a network of private computers infected with malicious software and controlled as a group?
Botnet
What authentication method uses unique biological characteristics for identification?
Biometric Authentication
What field involves collecting and analyzing computer data to use as evidence in legal cases?
Computer Forensics
What is the use of internet-based attacks to cause disruption or fear in society?
Cyberterrorism
What is a string of characters used in encryption algorithms to alter data?
Encryption Key
What type of attack aims to make a machine or network resource unavailable to its intended users by overwhelming it with traffic?
Distributed Denial-of-Service (DDoS) Attack
What policy allows employees to use their personal devices for work purposes?
Bring Your Own Device (BYOD)
What plan focuses on restoring IT systems after a disruption?
Disaster Recovery Plan
Which U.S. federal department is responsible for public security, broadly defined to include anti-terrorism, border security, immigration and customs, cyber security, and disaster prevention and management?
Department of Homeland Security (DHS)
What network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules?
Firewall
What type of malware encrypts the victim's files and demands payment for the decryption key?
Ransomware
What is a company that provides outsourced monitoring and management of security devices and systems?
Managed Security Service Provider (MSSP)
What term describes the capability to switch to a standby system or network upon failure of the primary system?
Failover
What document outlines an organization's security expectations and requirements?
Security Policy
What term describes the path or means by which a hacker gains access to a computer or network server?
Attack Vector
What is an attack that exploits a previously unknown vulnerability in a computer application?
Zero-Day Attack
What advanced firewall includes features like application awareness and intrusion prevention?
Next-Generation Firewall (NGFW)
What is a systematic evaluation of security measures within an organization?
Security Audit
What U.S. government team coordinates responses to significant cyber incidents?
U.S. Computer Emergency Readiness Team (US-CERT)