Computers
Virtualization and Servers
Risk and Security
Incident Response
MISC
100

Name all the major components of a client.

Motherboard, CPU, PSU, GPU, RAM, ROM, Storage

100

What are the two types of Hypervisors?

Bare Metal and Hosted

100

What is the difference between Whaling and Spear Phishing?

Whaling - high value targets for higher pay off

Spear Phishing - Specific target using messages that appeal to them

100

List the four members of the Incident Response Team.

Team Leader, Technical Specialist, Documentation Specialist, Legal Advisor

100

What does AAA stand for?

Authentication, Authorization, Accounting 

200

List the order of the Boot Process. What two things happen in the first part of the process?

1. BIOS 2. Boot Loader. 3. Kernel

Run POST, find bootable device

200

Name 2 different types of servers.

Mail, Proxy, Web, DNS, DHCP, etc.

200

What is a rootkit?

Hidden software that gives hacker privileged/root access to computer systems

200

Name 2 elements that should be in the Incident Response Plan.

  • Defined Incident Categories

  • Roles and Responsibilities

  • Reporting Requirements/Escalation

  • Computer/Cyber Incident Response Team

  • Exercise Planning and Scheduling

200

List 2 ways to practice good cyber hygiene. 

Firewalls, update antivirus software, run scans, password complexity, update software, back up data.

300

Name the components of the Windows Operating System.

Command Prompt, PowerShell, File Explorer, Search, Action Center, Start Menu

300

What are the three types of Cloud Service Models?

Iaas, Paas, Saas

300

What are the two types of Network Access Control software? 

Agent-based and Agentless

300

What is the difference between Events and Incidents?

Events are observable occurrences. Incidents are  occurrences that could potentially jeopardize the VIA triad. 

300

What is the STIG publication used for within DoD?

Standardizing Security Protocols 

400

What are the two types of CPU modes?

User and Kernel 

400

Name all the Active Directory Logical structure and identify which one encompasses everything.

Forest***, Tree, Domain, Organizational Unit, Objects

400

Name the three types of firewalls. Which one can read packet contents?

Packet filtering, Stateful, Application-Layer/Next Gen

Next Gen

400

List the 5 steps in the Incident Analysis step.

1. Gather Information

2. Validate The Incident

3. Determine The Operational Impact

4. Coordinate

5. Determine Reporting Requirements

400

What are the two types of Intrusion controls? Where can the be based?

IDS and IPS

Host-Based or Network-Based

500

What are the components of the Windows Operating System?

Interface, Drivers, Registry, Security, and File Management 

500

Pick a part the sections that create www.facebook.com/profile and label them. 

www - subdomain

facebook - domain name

.com - top-level domain

/profile - filepath 

500

How can removable storage threats be prevented?

Install a Host Based Security System or physically disable ports

500

List the 6 steps in the Incident Handling Process.

1. detection and Reporting 2. Preliminary Analysis and ID 3. Preliminary Response Actions 4. Incident Analysis 5. Response and Recovery 6. Post-Incident Analysis 

500

What do you place in the DMZ?

Any servers that need to be reached by the public. 
M
e
n
u