Data Security
Concepts
Network
Vulnerabilities
Access Control Mechanisms
Types of Attacks
Network Monitoring
and Management
Authentication
Methods
Malware and Threats
100

The access to data being restricted to those who need to know.  

What is confidentiality?

100

A weakness in software, hardware, or personnel.

What is a vulnerability?

100

Allows setting permissions based on a user's role in an organization.

What is RBAC?

100

It aims to disrupt the availability of a service.

What does DoS represent?

100

stands for Security Information and Event Management.

What is SIEM?

100

An example of something you know in authentication factors

What is a password?
100

Encrypts data and demands payment for restoration access.

What is ransomware?

200

data ensured to be accurate and trustworthy.

What is integrity?

200

This applies a severity and score to vulnerabilities.

What is CVSS?

200

Restricts user access to only what they need for their job functions.

What is limited privilege?

200

This uses multiple systems to shut down a server.
 

What is a DDoS attack?

200

Used to monitor and control network devices.

What is SNMP?

200

Enhances security by requiring more than one verification method.

What is multi-factor authentication?

200

Use commonly used passwords from a list to gain unauthorized access.

What are dictionary attacks?

300

Data accessed by the right people when needed.

What is availability?

300

When no known patch exists for a vulnerability.

What is a zero-day attack?

300

An example of physical network control

What is a CCTV camera?

300

Attempts to gain sensitive information through electronic communication.

What is phishing?

300

Alerts notify the IT team when metrics are outside acceptable ranges

What is SIEM notifications?

300

Extensible Authentication Protocol in network security contexts.

What is EAP?

300

Occurs when an attacker positions themselves between a user and their destination.

What is an on-path attack?

400

This is used to ensure data integrity. 

What is a digital signature?

400

A tool used to attack a vulnerability, commonly in software or code.

What is an exploit?

400

Applied to operations susceptible to fraud or abuse.

What is separation of duties?

400

An access point mimics another wireless access point's SSID and password.

What is an evil twin?

400

Identifies risks to the organization's network.

What is a vulnerability assessment?

400

Centralizes authentication for devices logging into networks using protocols like 802.1X.

What is Radius?

400

Records keystrokes, capturing sensitive information without user knowledge.

What is a keylogger?

500

 Individuals granted access to the network for a specific purpose

Who are contractors?

500

Malicious users who take advantage of network vulnerabilities

What are internal threats?

500

The concept that limits user access and permissions to only what they need for their job functions

What is least privilege?

500

Uses commonly used words/passwords from a list for unauthorized access attempts.

What are dictionary attacks?

500

Analyze logs from applications, devices, and security events for comprehensive monitoring.

What are SIEM systems?

500

The method that allows users to authenticate without entering credentials each time they access resources

What is Single Sign-On (SSO)?

500

Has the same SSID and password as another wireless access point, posing security risks to users connecting unknowingly.

What is an evil twin AP?