Acronyms
CIA
Control Types
VM
Command Line
100

Commonly Used Encryption Algorithm (2 answers)

Bonus: What is PII?

What is AES - Advanced Encryption Standard?

Bonus: What is Personally Identifiable Information 

100

1. Provides assurance that the data has not changed

2.  A system with fault tolerance can suffer a fault, but it can tolerance it continue to operate

3.Ensure data is only viewable by authorized users. 



1.What is Integrity?

2. What is Availability?

3. What is Confidentiality?

100

Helps ensures that changes do not result in unintended configuration errors.

Bonus: The two control type that describe the term

What is Change Management

Bonus: What is an Operational Control and Preventive Control?

100

This software creates, run and manages VM's.

Bonus: The central part of the operating system?


What is Hypervisor?

Bonus: What is a Kernel?

100

Allows you to use it to configure the NIC, enable promiscuous mode on a NIC and manipulate settings on the network interfaces. 

Bonus: What system uses this method?

What is ifconfig?

Bonus: What is Linux?

200

Command list of routers between two systems.

Bonus: Another name for router. 


What is Tracert

Bonus: What is a hop?

200

This helps ensure that only authorized personnel can access data. 

Bonus: What are the three main elements?


What are Access Controls?

Bonus: What are identification, authentication and authorization?

200

System Recovery is to Corrective Control as Least Privilege is to...

What is Technical Control?

200

Microsoft Hyper-V hypervisor runs within a Microsoft operating system. What type is this?

Bonus: this hypervisor is sometimes referred to bare metal hypervisor?


What is Type II Hypervisor?

Bonus: What is Type I Hypervisor?

200

Identifies IP address, host name and RTT's of each hop, modified paths and faulty routers.

Bonus: What does RTT mean?

What is Tracert?

What are Round Trip Times?

300

1. SPOF

2. VDI

3. VDE

4. DNS

1. What is Single Point of Failure?

2. What is Virtual Desktop Infrasture

3. What is Virtual Desktop Environment

4. What is a Domain Name Server?


300

Used to verify the integrity of emails and files, provide authentication and non repudiation. Requires the use of certificates and PKI - Public Key Infrastructure. 

Bonus: MD5, SHA-1 and HMAC are what?

What are Digital Signatures?

Bonus: What are hashing algorithms?



300

Part 1- Video Surveillance without Record Capabilities

Part 2 - Security Guards

Part 3 - Trend Analysis

Bonus: A test to attempt to comprise the server by exploiting one or more of the unpatched vulnerabilities? From what control?

Part 1 -What is Deterrent Control?

Part 2 - What is Preventive Control?

Part 3 - What is Detective Control?

Bonus: What is a Penetration Test? 

What is Administrative Control?

300

An attack that allows an attacker to access the host system from within the virtual system?

Bonus: Vendors can write and release this to fix the situation.


What is VM Escape?

Bonus: What are patches?

300

Used to identify the MAC address on your local network. (Acronym and Definition - 2 answers)

Bonus: What does MAC stand for?

What is ARP - Address Resolution Protocol 

What is MAC - Media Access Control 

400

1. IDS

2. IPS

1. What is a Intrusion Detection System

2. What is a Intrusion Prevention System

400

Uses controls to reduce risks.

Bonus: An event that can negatively effect CIA.

What is Risk Mitigation?

Bonus: What is Security Incident?

400

An organization might require employees to use smart cards. New employees need access to the network right away and maintain a high level of security. Employees are given a TOTP.

Bonus: What is TOTP?

What are compensating controls?

Bonus: What is a Time Based One Time Password?

400

Each user has a custom desktop image.

Bonus: What you do prior to applying patches, or installing new applications?

What is Persistence?

Bonus: What is Take a Snapshot?

400

Allows you to view statistics for TCP/IP on a system. (Acronym and Definition - 2 answers)

Bonus: What is TCP/IP and the FIVE items it shows?

What is Netstat - Network Statistics?

TCP/ IP - Transmission Control Protocol / Internet Protocol

- IP addresses, subnet mask, desfault gateway, MAC address and DNS (Domain Name System)

500

1. MAC - physical address assigned to NIC

2. MAC - uses labels

3. MAC - provides integrity similar to how a hash is used

1. What is Media Access Control?

2. What is Mandatory Access Controls?

3. What is a Message Authentication Code?

500

Makes something unclear or difficult to understand.

Bonus: Hides data within data

What is Obfuscation?

Bonus: What is Steganography



500

T/F - 1: Hardening is a deterrent control

T/F - 2: Cable locks are physical, detective controls

T/F - 3: Preventive controls stop attackers after they caused a threat

T/F - 4: Detective controls stops the event from taking action 

BONUS: what is a IPA?

T/F - 1: What is False: Hardening is a preventive control 

T/F - 2: What is False: Cable Locks are physical, deterrent controls

T/F - 3: What is False: Preventive controls prevent attacks BEFORE the action

T/F - 4: What is False; Detective controls review the action AFTER it happened

Bonus: What is Intrusion Prevention System

500

Which type of virtualization allows a computer's OS kernel to run multiple isolated instances of a guest virtual machine, with each guest sharing the kernel?

What is Container Virtualization?

500

1. Check three main actions when testing connectivity

2. What are the three main actions

Bonus: What does ICMP stand for?

1.What is Ping?                                                  2.What is IP addresses, tests NIC and security posture of a network.

What is Internet Control Message Protocol.

M
e
n
u