The "C" in CIA Triad stands for this, which means keeping data secret.
What is Confidentiality?
This port number is used for secure web browsing (HTTPS).
What is 443?
MFA requires factors from at least this many DIFFERENT categories.
What is TWO (2)?
This incident response phase involves creating policies, training staff, and preparing tools BEFORE an attack.
What is Preparation?
In ALL cloud models (IaaS, PaaS, SaaS), the customer is ALWAYS responsible for protecting this.
What is data?
This CIA component ensures data hasn't been tampered with or altered.
What is Integrity?
This insecure protocol uses port 23 and should never be used.
What is telnet?
A password is "something you know," and a fingerprint is this type of factor.
What is "something you are"?
The formula SLE = Asset Value times this factor.
What is Exposure Factor (EF)?
Gmail and Dropbox are examples of this fully-managed cloud service model.
What is SaaS (Software as a Service)?
Encryption protects confidentiality, but THIS technique (like SHA-256) verifies integrity.
What is Hashing?
AES is this type of encryption that uses the same key to encrypt and decrypt.
What is symmetric encryption?
In this access control model, job roles like "nurse" or "doctor" determine permissions.
What is RBAC (Role-Based Access Control)?
During this IR phase, you isolate infected systems from the network to stop malware spread.
What is Containment?
In this cloud model, you manage operating systems and applications while the provider manages physical infrastructure.
What is IaaS (Infrastructure as a Service)?
A DDoS attack primarily threatens this CIA element.
What is Availability?
Windows Remote Desktop Protocol (RDP) uses this port.
What is 3389?
This access control model uses classification labels like "Top Secret" and is mandatory in military environments.
What is MAC (Mandatory Access Control)?
This metric defines maximum acceptable downtime in disaster recovery.
What are RTO (Recovery Time Objective)
This semi-trusted network zone sits between your internal network and the internet.
What is DMZ (Demilitarized Zone)?
This principle states you should only grant the minimum access needed to perform a job, protecting all three CIA elements.
What is Least Privilege?
SHA-256 is not encryption; it's this one-way function used to verify integrity.
What is hashing?
This modern access control model grants access based on contextual attributes like time of day, location, device posture, AND role.
What is ABAC (Attribute-Based Access Control)?
This metric defines maximum acceptable data loss in disaster recovery.
What is RPO (Recovery Point Objective)?
This cloud attack allows a malicious VM to break out and access the host system or other VMs on the same hypervisor.
What is VM escape?