A security team sets up a system that immediately sends an email alert whenever unauthorized login attempts are detected, without any manual monitoring. What is this process called?
Automation
While working from a coffee shop, a user connects to the public Wi-Fi and tries to log in to their company’s email. Unbeknownst to them, an attacker is secretly intercepting and potentially altering the traffic between the user and the email server. What type of attack is occurring?
On-path attack
would allow members of one organization to authenticate
using the credentials of another organization
Federation
is a formal document where
both sides agree to a broad set of goals and objectives associated with the partnership.
MOA
happens when two or more processes try to use the same resource at the same time, and the outcome depends on the order of execution. Attackers can exploit this timing flaw to bypass security checks or gain unauthorized access.
Race condition
refers to the trustworthiness of data. A digital signature allows
the recipient to confirm that none of the data has been changed since the digital signature was created
Integrity
A plan that ensures a business or organization can keep running critical functions during and after a disruption (like a cyberattack, disaster, or outage).
Continuity of operations
A security method where each individual record in a database (like a single customer’s file) is encrypted separately, instead of encrypting the whole database or table at once.
Record level encryption
writes data to a temporary journal before writing the
information to the database. If power is lost, the system can recover the last transaction from the journal when power is restored.
Journaling
provides a centralized management system for all mobile devices
MDM (Mobile Device Manager)
An IT help desk is using automation to improve the response time for security events. What would this be considered?
Escalation
The process of setting up and allocating the necessary resources (like servers, storage, network, or user accounts) so that systems, applications, or users can function properly.
Resource Provisioning
The latest Wi-Fi security standard that improves protection by using stronger encryption, blocking password-guessing attacks, and adding forward secrecy so past data stays safe even if the password is exposed later.
WPA3
uses a centralized authentication server, and this allows all users to
use their corporate credentials during the login process.
802.1x
Access control model that uses user, resource, action, and environment attributes to decide access.
Attribute-Based Access Control (ABAC)
identifies and documents the risks associated with each
step of a project plan
A company’s ___ lists “Data breach from phishing attack” as a high-likelihood, high-impact risk, with mitigation steps like employee training and stronger email filtering to reduce the chance of compromise.
Risk Register
A type of cyberattack where an attacker inserts malicious code into an input field (like a login form) to manipulate a database, steal data, or bypass authentication.
SQL Injection
When an attacker intercepts and reuses valid data to gain unauthorized access or perform malicious actions.
Replay attack
A system used to monitor and control industrial processes such as power plants, water treatment, manufacturing, and utilities
SCADA (Supervisory Control and Data Acquisition)
Installing apps from unofficial sources instead of the official app store.
Side loading
Isolated processor that securely stores and processes sensitive data on a device.
Secure enclave
In a company, one employee’s role is to make sure customer data is accurate, consistent across systems, and handled according to company rules. What is this role called?
Data Steward
____ protects all data saved on a storage drive, but it does
not provide any data protection for messages or attachments sent between
email servers.
Think of it like locking your laptop with a strong key — everything on the drive is safe if someone steals it, but emails sent over the internet are still exposed unless separately encrypted.
Full disk encryption
An administrator wants to separate the HR and IT departments onto different logical networks while using the same physical switch. What should the administrator configure?
VLAN