Commonly Used Encryption Algorithm (2 answers)
Bonus: What is PII?
What is AES - Advanced Encryption Standard?
Bonus: What is Personally Identifiable Information
1. Provides assurance that the data has not changed
2. A system with fault tolerance can suffer a fault, but it can tolerance it continue to operate
3.Ensure data is only viewable by authorized users.
1.What is Integrity?
2. What is Availability?
3. What is Confidentiality?
Helps ensures that changes do not result in unintended configuration errors.
Bonus: The two control type that describe the term
What is Change Management
Bonus: What is an Operational Control and Preventive Control?
This software creates, run and manages VM's.
Bonus: The central part of the operating system?
What is Hypervisor?
Bonus: What is a Kernel?
Allows you to use it to configure the NIC, enable promiscuous mode on a NIC and manipulate settings on the network interfaces.
Bonus: What system uses this method?
What is ifconfig?
Bonus: What is Linux?
Command list of routers between two systems.
Bonus: Another name for router.
What is Tracert
Bonus: What is a hop?
This helps ensure that only authorized personnel can access data.
Bonus: What are the three main elements?
What are Access Controls?
Bonus: What are identification, authentication and authorization?
System Recovery is to Corrective Control as Least Privilege is to...
What is Technical Control?
Microsoft Hyper-V hypervisor runs within a Microsoft operating system. What type is this?
Bonus: this hypervisor is sometimes referred to bare metal hypervisor?
What is Type II Hypervisor?
Bonus: What is Type I Hypervisor?
Identifies IP address, host name and RTT's of each hop, modified paths and faulty routers.
Bonus: What does RTT mean?
What is Tracert?
What are Round Trip Times?
1. SPOF
2. VDI
3. VDE
4. DNS
1. What is Single Point of Failure?
2. What is Virtual Desktop Infrasture
3. What is Virtual Desktop Environment
4. What is a Domain Name Server?
Used to verify the integrity of emails and files, provide authentication and non repudiation. Requires the use of certificates and PKI - Public Key Infrastructure.
Bonus: MD5, SHA-1 and HMAC are what?
What are Digital Signatures?
Bonus: What are hashing algorithms?
Part 1- Video Surveillance without Record Capabilities
Part 2 - Security Guards
Part 3 - Trend Analysis
Bonus: A test to attempt to comprise the server by exploiting one or more of the unpatched vulnerabilities? From what control?
Part 1 -What is Deterrent Control?
Part 2 - What is Preventive Control?
Part 3 - What is Detective Control?
Bonus: What is a Penetration Test?
What is Administrative Control?
An attack that allows an attacker to access the host system from within the virtual system?
Bonus: Vendors can write and release this to fix the situation.
What is VM Escape?
Bonus: What are patches?
Used to identify the MAC address on your local network. (Acronym and Definition - 2 answers)
Bonus: What does MAC stand for?
What is ARP - Address Resolution Protocol
What is MAC - Media Access Control
1. IDS
2. IPS
1. What is a Intrusion Detection System
2. What is a Intrusion Prevention System
Uses controls to reduce risks.
Bonus: An event that can negatively effect CIA.
What is Risk Mitigation?
Bonus: What is Security Incident?
An organization might require employees to use smart cards. New employees need access to the network right away and maintain a high level of security. Employees are given a TOTP.
Bonus: What is TOTP?
What are compensating controls?
Bonus: What is a Time Based One Time Password?
Each user has a custom desktop image.
Bonus: What you do prior to applying patches, or installing new applications?
What is Persistence?
Bonus: What is Take a Snapshot?
Allows you to view statistics for TCP/IP on a system. (Acronym and Definition - 2 answers)
Bonus: What is TCP/IP and the FIVE items it shows?
What is Netstat - Network Statistics?
TCP/ IP - Transmission Control Protocol / Internet Protocol
- IP addresses, subnet mask, desfault gateway, MAC address and DNS (Domain Name System)
1. MAC - physical address assigned to NIC
2. MAC - uses labels
3. MAC - provides integrity similar to how a hash is used
1. What is Media Access Control?
2. What is Mandatory Access Controls?
3. What is a Message Authentication Code?
Makes something unclear or difficult to understand.
Bonus: Hides data within data
What is Obfuscation?
Bonus: What is Steganography
T/F - 1: Hardening is a deterrent control
T/F - 2: Cable locks are physical, detective controls
T/F - 3: Preventive controls stop attackers after they caused a threat
T/F - 4: Detective controls stops the event from taking action
BONUS: what is a IPA?
T/F - 1: What is False: Hardening is a preventive control
T/F - 2: What is False: Cable Locks are physical, deterrent controls
T/F - 3: What is False: Preventive controls prevent attacks BEFORE the action
T/F - 4: What is False; Detective controls review the action AFTER it happened
Bonus: What is Intrusion Prevention System
Which type of virtualization allows a computer's OS kernel to run multiple isolated instances of a guest virtual machine, with each guest sharing the kernel?
What is Container Virtualization?
1. Check three main actions when testing connectivity
2. What are the three main actions
Bonus: What does ICMP stand for?
1.What is Ping? 2.What is IP addresses, tests NIC and security posture of a network.
What is Internet Control Message Protocol.