How is risk mathematically calculated in cybersecurity?
Risk = Threat x Vulnerability x Impact
What term defines a weakness in a system or design that can be exploited by a threat?
Vulnerability
What is the specific tool or code used to take advantage of a system weakness?
Exploit
Which strategy involves placing multiple, redundant security controls throughout an IT infrastructure?
Defense-in-Depth
What are the three core goals of the CIA Triad?
Confidentiality, Integrity, and Availability.
Which component of the CIA Triad focuses on ensuring data is accurate and has not been improperly modified?
Integrity
What type of attacker is primarily motivated by financial gain through activities like ransomware?
Organized Crime
Which step of the AAA framework involves verifying the identity of a user?
Authentication
In the AAA framework, what is the process of tracking and logging user actions called?
Accounting
Why are two different passwords considered a single factor of authentication?
They both belong to the same category (something you know).
What is the primary difference between symmetric and asymmetric encryption?
Symmetric uses one shared key, while asymmetric uses a public/private key pair.
Data that is currently being processed in RAM or by the CPU is in what state?
Data in use
Which secure protocol is the encrypted replacement for Telnet for remote management?
SSH (Secure Shell)
What vulnerability allows an attacker to hijack traffic by sending false MAC-to-IP mappings?
ARP Spoofing (or ARP Poisoning)
Which network segment is used to host public-facing services like web and email servers?
DMZ (Demilitarized Zone)
What is the fundamental difference in action between an IDS and an IPS?
An IDS only alerts administrators, while an IPS can actively block or drop traffic.
Which wireless encryption standard is the most current and secure?
WPA3
What technology authenticates and authorizes a device’s health before allowing it to join a network?
Network Access Control (NAC)
Which operating system security model relies on NTFS permissions and Group Policy for control?
Windows
In the Linux file permission system, what does the ‘rwx’ notation represent?
Read, Write, and Execute.
What is the highest-privilege administrative account in a Linux system?
Root
What term describes an attack where a user gains higher access rights than they were intended to have?
Privilege Escalation
Why are Linux and macOS generally considered more secure “out of the box” than Windows?
They operate with lower default user permissions (non-administrator accounts).
What is the primary function of a host-based firewall?
To control traffic for and protect a specific, individual machine.