Preventive Controls - correct answer Objective: Prevent security incidents from occurring.
Examples: Firewalls, Access control mechanisms (e.g., passwords, biometrics) Intrusion
prevention systems (IPS), Security policies and procedures
Deterrent Controls - correct answer Objective: Discourage potential attackers from attempting
to compromise a system. Examples: Warning signs, Security awareness training, Visible security
measures (e.g., security guards, CCTV)
Detective Controls - correct answer Objective: Detect and alert on security incidents as they
occur. Examples: Intrusion detection systems (IDS), Security information and event
management (SIEM) systems, Audit logs and monitoring, Surveillance cameras
Corrective Controls - correct answer Objective: Correct and mitigate the impact of security
incidents. Examples: Antivirus and anti-malware software, Backup and recovery procedures,
Patch management systems, Incident response plans
Compensating Controls - correct answer Compensating controls are security measures
implemented to provide an alternative method of protecting assets when standard controls are
not feasible. Examples: Temporary access restrictions, Alternative authentication mechanisms,
Additional monitoring when primary controls are down
Directive Controls - correct answer Objective: Specify acceptable practices and expected
behavior. Examples: Security policies and guidelines, Employee handbooks, Standard operating
procedures (SOPs), Codes of conduct
Define the Five Core principles of Information Security (CIANA) - correct answer Confidentiality,
Integrity, Availability, Non-Repudiation, Authentication
Gap Analysis Steps - correct answer Define the scope, Gather data about the current
infrastructure, Analyze the data and identify the gaps, Develop a plan to bridge the gap
Honeypot - correct answer A honeypot is a decoy system or resource designed to attract and
deceive attackers. It appears to be a legitimate part of the network but is isolated and
monitored to gather information about attackers' tactics, techniques, and motives.
Honeynet - correct answer A honeynet is a network of honeypots that are interconnected to
simulate a larger and more realistic environment for attracting and monitoring attackers. It
allows organizations to capture and analyze broader attack patterns and behaviors.
Honeyfile - correct answer A honeyfile is a file or document that is intentionally created and
placed in a network to act as bait for attackers. It contains seemingly valuable information that,
if accessed or modified, triggers alerts and provides insights into unauthorized access attempts.
,Honeytoken - correct answer A honeytoken is a piece of data or credential that is intentionally
placed within an information system to serve as a decoy or indicator of unauthorized access. If
a honeytoken is accessed or used, it alerts security teams to potential security breaches.
Non-Repudiation - correct answer A security principle ensuring that a party in a communication
cannot deny the authenticity of their signature on a document or the sending of a message that
they originated. This is typically achieved through the use of cryptographic methods, such as
digital signatures and public key infrastructure (PKI).
What are the five factors of Authentication - correct answer Knowledge Factor: Something You
Know, Possession Factor: Something You Have, Inherence Factor: Something You Are,
Behavioral Biometrics: Something You Do, Location Factor: Somewhere You Are
PTZ - correct answer Pan-Tilt-Zoom
FRR - correct answer False Rejection Rate - How often a biometric system fails to allow a user
access who should have had access
Chiper Lock - correct answer A Mechanical locking mechanism that uses a mechanical keypad
for entry
Infrared Sensor - correct answer IR sensors can be either active or passive. Active IR sensors
emit infrared light and measure the reflection, while passive IR sensors detect the infrared light
naturally emitted by objects. Used in: Motion Detection, Remote Controls, Thermal Cameras,
Temperature sensors
Microwave Sensor - correct answer A microwave sensor uses microwave radar to detect
objects and motion. These sensors emit microwaves and measure the time it takes for the
waves to be reflected back after hitting an object. Used in: Automatic Doors, Speed Radars,
Occupancy Sensing, Motion sensors
Ultrasonic Sensor - correct answer An ultrasonic sensor uses ultrasonic sound waves to detect
objects and measure distances. The sensor emits sound waves at a high frequency and
measures the time it takes for the echo to return after hitting an object. Used in: Parking
Assistance, Robotics, Industrial Automation
Shadow IT - correct answer A type of threat actor that creates internal threats involving the use
of systems, devices, software, applications, and services that are used within an organization
without explicit approval or knowledge of the organization's IT department.
Name all four Security Controls - correct answer Detective, Compensating, Directive, Corrective
Social Proof - correct answer A psychological and social phenomenon where individuals copy
the actions of others in an attempt to reflect correct behavior for a given situation. This concept
is often exploited in social engineering attacks
, Typosquatting - correct answer "Typosquatting" is a form of cyber-attack where malicious
actors register domain names that are similar to legitimate websites, often differing by a small
typo or misspelling. Example: Real: Facebook.com | Fake: Facebo0k.com
Watering Hole Attack - correct answer A "watering hole attack" is a type of cyber-attack in
which attackers compromise a specific website or set of websites that are frequently visited by
a particular group, organization, or industry. The goal is to infect the visitors of these sites with
malware.
Phishing - correct answer Phishing is a cyber-attack where attackers send fraudulent emails or
messages pretending to be from reputable sources to trick individuals into revealing sensitive
information, such as usernames, passwords, and credit card details.
Spear Phishing - correct answer Spear phishing is a targeted phishing attack aimed at a specific
individual or organization. Attackers gather personal information about their target to craft a
highly personalized and convincing email or message to deceive them into revealing sensitive
information.
Whaling - correct answer Whaling is a type of phishing attack that targets high-profile
individuals, such as executives or senior management, within an organization. The attacker
impersonates a trusted entity to deceive the target into divulging sensitive information or
authorizing significant financial transactions.
Vishing - correct answer Vishing, or voice phishing, involves attackers using phone calls to
impersonate legitimate organizations or individuals to trick victims into providing personal
information, such as credit card numbers or social security numbers.
Smishing - correct answer Smishing, or SMS phishing, involves attackers sending fraudulent text
messages that appear to come from reputable sources. These messages often contain links or
phone numbers that lead to phishing websites or prompt the victim to provide personal
information.
Business Email Compromise (BEC) - correct answer Business Email Compromise (BEC) is a
sophisticated phishing attack where attackers spoof or compromise a legitimate business email
account to deceive employees, partners, or customers into transferring money or sensitive
information. BEC often targets employees with access to company finances or valuable data.
Invoice Scam - correct answer A type of social engineering attack where cybercriminals send
fraudulent invoices to a business or individual, hoping to trick the recipient into making a
payment to the attacker's account.
Baiting - correct answer "Baiting" is a type of social engineering attack where an attacker
entices a victim with a lure, such as a seemingly harmless or appealing object, to trick them into
compromising their security.