14.1
14.2
14.3
14.4
14.5
100

What term refers to the process of converting cleartext, or unencrypted, data into an unreadable format by using a special key and mathematical algorithm. 

Encryption

100

What term refers to the Detection of a security incident discovered when not actively looking for it?

Passive detection

100

What term refers to a metal pole installed in the ground to prevent vehicle access. Can be installed near the front of a building to prevent a vehicle from getting too close?

Bollard

100

What term refers to the process in which users provide credentials to prove their identity?

Authentication

100

What term refers to the practice of exploiting people to gain access to unauthorized areas and systems?

Social engineering

200

What term refers to any data that is not currently being accessed?

Data at rest

200

What term refers to the detection of a security incident when actively looking for security incidents?

Active detection

200

What term refers to the process of someone attempting to enter a building by following closely behind an authorized person or sneaking in with a group of authorized people?

Piggybacking / Tailgating

200

What term refers to the process that defines the resources a user can access once authenticated?

Authorization

200

What term refers to an attack that uses a malicious email crafted to look legitimate. The intent is to have a user click a link to a malicious website or download a malicious file?

Phishing

300

What term refers to the process of proving a user's identity?

Authentication

300

What term refers to the detection of a security incident when the organization is actively looking for security flaws in its systems?

Proactive detection

300

What term refers to a specialized entrance with two doors that creates a security buffer zone between two areas?

Access control vestibule (ACV)

300

The practice of giving users access to only the resources needed to perform their job?

Principle of least privilege

300

What term refers to a social engineering attack in which the hacker gathers sensitive information by looking over a target's shoulder while the target is working on a computer?

Shoulder surfing

400

What term refers to the practice of giving users only the resources needed to perform their job?

Principle of least privilege

400

What term refers to The documentation and procedures used to detail the handling of any evidence?

Chain of custody

400

What term refers to a metal detector that users walk through to detect weapons or unauthorized equipment?

Magnetometer

400

What term refers to a mechanism used to manage and enforce user access to resources?

Access control list (ACL)

400

What term refers to a password cracking attack in which the attacker uses a list of words and phrases to guess the decryption key?

Dictionary attack

500
What are three synonyms for the word initiatives?
The three synonyms for the word (initiatives) are action, ambition, drive.
500

What term refers to the person or team that should be immediately notified when a security incident is discovered?

First responder

500

What term refers to a person's physical traits (such as fingerprints or retinal scans) used to verify a person's identity?

Biometrics

500

What term refers to a software tool that implements the policies and procedures used by an organization to maintain security and permissions on mobile devices?

Mobile device management (MDM)

500

What term refers to a password cracking attack in which the attacker attempts to guess passwords by using a cracking tool that submits every possible letter, number, and symbol combination?

Brute force attack