CIA Triad
Threat Actors
Security Operations
Access Control
Cryptography
100

This CIA principle ensures only authorized individuals have access to information.

What is Confidentiality 

100

This type of hacker is motivated by financial gain.

What is a Cybercriminal

100

SIEM solutions are used to aggregate and analyze this type of data.

What are Security Logs

100

This access control method assigns permissions based on job roles.

What is Role-based Access Control (RBAC)

100

AES is a popular encryption standard that falls under this category.

What is Symmetric Encryption

200

This principle ensures information is accurate and unaltered.

What is Integrity

200

These hackers, sometimes referred to as Advanced Persistent Threats (APTs), engage in cyber espionage, sabotage, and warfare to serve their interests.

What is a Nation-State Hacker

200

This team proactively tests an organization's security by simulating attacks.

What is a Red Team

200

The principle of granting only necessary permissions is known as this.

What is Least Priviledge

200

This cryptographic hashing algorithm is widely used for integrity verification.

What is SHA-256

300

This principle ensures systems remain functional for users when needed.

What is Availability
300

This threat actor has minimal technical skills and relies on pre-made attack scripts.

What is a Script Kiddie

300

The practice of securing endpoints like laptops and mobile devices.

What is Endpoint Security

300

The security model that assigns access using security labels.

What is Mandatory Access Control (MAC)

300

Public and private keys are a feature of this encryption type.

What is Asymmetric Encryption

400

A cyberattack that modifies data improperly violates this CIA principle.

What is Integrity

400

A disgruntled employee leaking company data is known as this.

What is an Insider Threat

400

This protocol encrypts remote login sessions.

What is Secure Shell (SSH)

400

This authentication method requires multiple factors such as passwords and biometrics.

What is Multi-Factor Authentication (MFA)

400

TLS and SSL are protocols that secure this time of data exchange.

What is Web Traffic

500

This security measure helps preserve confidentiality by encrypting data.

What is encryption

500

Hackers motivated by social or political causes fall under this category.

What is a Hacktivist

500

This security concept ensures critical systems remain operational even after a failure.

What is Business Continuity

500

This concept prevents any single individual from having too much control over security process.

What is Separation of Duties

500

This cryptographic technique ensures non-repudiation of digital messages.

What is Digital Signatures