CYBERSECURITY TERMINOLOGY WITH CORRECT DEFINITIONS #12
Which of these is not considered one of the three pillars of cybersecurity? - correct answer
Threat actors
Which of these terms is not another name for cybersecurity? - correct answer Exposure sec
Which team enables findings to be shared, which results in a stronger security team and better
security tactics? - correct answer Purple
Who is the primary entity focused on ensuring a risk-minded environment and risk-averse
culture? - correct answer Security awareness
Passport or driver's license data is considered - correct answer Sensitive PII
What does the acronym CIA stand for? - correct answer Confidentiality, Integrity, Availability
Jamel's role requires specific access in order for him to do his job functions. What type of
control should he have? - correct answer Least privilege
Why would a company conduct a penetration test within their environment? - correct answer
To find flaws or vulnerabilities in a controlled environment
How are humans and artificial intelligence different? - correct answer Humans are curious and
ask "why", while AI learns the "how".
Jan is using a public Wi-Fi while she is accessing information from her company's environment.
What should Jan be using for added security in this situation? - correct answer a VPN
What type of attack will a threat actor use in order to overload a server so no one can access it?
- correct answer DDoS
Which of these is not considered one of the three pillars of cybersecurity? - correct answer
Threat actors
Which of these terms is not another name for cybersecurity? - correct answer Exposure sec
Which team enables findings to be shared, which results in a stronger security team and better
security tactics? - correct answer Purple
Who is the primary entity focused on ensuring a risk-minded environment and risk-averse
culture? - correct answer Security awareness
Passport or driver's license data is considered - correct answer Sensitive PII
What does the acronym CIA stand for? - correct answer Confidentiality, Integrity, Availability
Jamel's role requires specific access in order for him to do his job functions. What type of
control should he have? - correct answer Least privilege
Why would a company conduct a penetration test within their environment? - correct answer
To find flaws or vulnerabilities in a controlled environment
How are humans and artificial intelligence different? - correct answer Humans are curious and
ask "why", while AI learns the "how".
Jan is using a public Wi-Fi while she is accessing information from her company's environment.
What should Jan be using for added security in this situation? - correct answer a VPN
What type of attack will a threat actor use in order to overload a server so no one can access it?
- correct answer DDoS