Basics of Cybersecurity
Data
Risk Management
Internet Basics
Information Assurance
100

Another term for a cyberattack.

What is a hack?

100

The three states of data.

What are at rest, in transit, and in use?

100

The definition of risk management.

What is the development of a plan for how the organization will address the various cybersecurity risks it faces?

100

The browser that allows access to the Dark Web.

What is The Onion Router?

100

The components of the CIA Triad.

What is Confidentiality, Integrity, and Availability?

200

The definition of cyber.

What is of, or relating to, or involving computers or computer networks?

200

What information allows businesses and users to do.

What is make informed decisions?

200

The 3 aspects of risk.

What are assets (things of value), vulnerabilities of assets, and potential threats that can exploit the vulnerabilities?

200

The percentage of content on the Internet available via the World Wide Web and the Deep Web

What is 4% (World Wide Web) and 90% (Deep Web)?

200

The definition of integrity as it relates to the CIA Triad.

What is maintaining the consistency, accuracy, and trustworthiness of data?

300

The definition of a cyberattack.

An attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or network.

300

Where data can be stored.

What are computers, desktops, external hard drives, servers, and flash drives?

300

The definition of risk transfer.

What is an organization shifts the financial liability for loss to an insurance company?

300

The definition of the Internet.

What is the global communications network over which devices send and receive data?

300

The difference between authentication and authorization.

What is authentication determines a user's identity, while authorization determines a user's permissions?

400

The definition of cyberspace.

What is the online virtual computer world, and more specifically, the electronic medium that is used to facilitate online communication?

400

The difference between data and information.

What is data is a collection of values and has little meaning to a human, while information is data that has been processed and organized, providing context?

400

The type of black hat hacker that poses the highest risk.

What is hostile nation-states, due to their ability to effectively employ technology & tools against the most difficult of targets?

400

The components of the Internet.

What is the networking hardware, the physical cabling, and radio transmissions?

400

The 5 pillars of information assurance.

What are Confidentiality, Integrity, Availability, Authentication, and Non-Repudiation?

500

The core feature of cyberspace.

What is an interactive and virtual environment for a broad range of participants?

500
The main threats to data in storage.

What are the data being stolen, the data being changed, and the data being deleted or held for ransom?

500

The definition of a zero day attack.

What is an attack on a previously unknown vulnerability in an operating system or software application?

500

The definition of a URL and what it includes.

What is what you see at the top of your browser page, including the website’s name (domain name) and additional detail telling the website what specific page on the site it is?

500

The definition of non-repudiation.

What is the assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity so that neither can later deny having processed the information?