Cybersecurity Basics
Common Ports & Cryptography
Authentication & Access Control
Risk Management & Incident Response
Cloud Security
100

The "C" in CIA Triad stands for this, which means keeping data secret.

What is Confidentiality?

100

This port number is used for secure web browsing (HTTPS).

What is 443?

100

MFA requires factors from at least this many DIFFERENT categories.

What is TWO (2)?

100

This incident response phase involves creating policies, training staff, and preparing tools BEFORE an attack.

What is Preparation? 

100

In ALL cloud models (IaaS, PaaS, SaaS), the customer is ALWAYS responsible for protecting this.

What is data?

200

This CIA component ensures data hasn't been tampered with or altered.

What is Integrity?

200

This insecure protocol uses port 23 and should never be used.

What is telnet?

200

A password is "something you know," and a fingerprint is this type of factor.

What is "something you are"?

200

The formula SLE = Asset Value times this factor.

What is Exposure Factor (EF)?

200

Gmail and Dropbox are examples of this fully-managed cloud service model.

What is SaaS (Software as a Service)?

300

Encryption protects confidentiality, but THIS technique (like SHA-256) verifies integrity.

What is Hashing?

300

AES is this type of encryption that uses the same key to encrypt and decrypt.

What is symmetric encryption?

300

In this access control model, job roles like "nurse" or "doctor" determine permissions.

What is RBAC (Role-Based Access Control)?

300

During this IR phase, you isolate infected systems from the network to stop malware spread.

What is Containment?

300

In this cloud model, you manage operating systems and applications while the provider manages physical infrastructure.

What is IaaS (Infrastructure as a Service)?

400

A DDoS attack primarily threatens this CIA element.

What is Availability?

400

Windows Remote Desktop Protocol (RDP) uses this port.

What is 3389?

400

This access control model uses classification labels like "Top Secret" and is mandatory in military environments.

What is MAC (Mandatory Access Control)?

400

This metric defines maximum acceptable downtime in disaster recovery.

What are RTO (Recovery Time Objective)

400

This semi-trusted network zone sits between your internal network and the internet.

What is DMZ (Demilitarized Zone)?

500

This principle states you should only grant the minimum access needed to perform a job, protecting all three CIA elements.

What is Least Privilege?

500

SHA-256 is not encryption; it's this one-way function used to verify integrity.

What is hashing?

500

This modern access control model grants access based on contextual attributes like time of day, location, device posture, AND role.

What is ABAC (Attribute-Based Access Control)?

500

This metric defines maximum acceptable data loss  in disaster recovery.

What is RPO (Recovery Point Objective)? 

500

This cloud attack allows a malicious VM to break out and access the host system or other VMs on the same hypervisor.

What is VM escape?