Defense-in-Depth
Security Policies, Regulations, and Standards
Access Control
Information Sources
Threat Intelligence Services
100

Define Vulnerabilities

A weakness in a system or its design that could be exploited by a threat actor

100

Define BYOD

1.Bring Your Own Device 

2. A policy that enables employees to use their own mobile devices to access company systems, software, networks, or information 

100

What are three access control security services?

Authorization, Accounting, Authentication 

100

What is SecurityNewsWire?

A security news portal that aggregates the latest breaking news pertaining to alerts, exploits, and vulnerabilities.

100

What is the free service that is offered by the U.S. Department of Homeland Security?

AIS (Automated Indicator Sharing)

200

What is the Security Onion?

A common analogy used to describe a defense-in-depth approach

200

Name one security practices to help migrate BYOD vulnerabilities

Password protected access, Manually control wireless connectivity, Keep updated ,Back up data,Enable “Find my Device” and more

200

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

Authorization

200

What is the purpose of Cisco Cybersecurity Reports?

To provide an update on the state of security preparedness, expert analysis of top vulnerabilities, factors behind the explosion of attacks using adware, spam, and more. 

200

What is a world leading threat intelligence team with a goal to help protect enterprise users, data, and infrastructure from active adversaries?

Talos

300

Define a Threat

Any potential danger to an asset 

300

What component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do?

Acceptable Use Policy

300

Which access control model is based on attributes of the object (resource) to be accessed, the subject (user) accessing the resource, and environmental factors regarding how the object is to be accessed, such as time of day?

Attribute-based

300

What is the primary function of (ISC2)?

to provide vendor neutral education products and career services

300

Which security operations platform integrates and enhances a range of security tools and threat intelligence?

HINT-🔥👁️

FireEye Helix

400

What is the Security Artichoke?

A analogy to show how the changes in the landscape of network as made things easier for hackers  

400

Which areas must an IT security person understand in order to identify vulnerabilities on a network?

1.Hardware used by application

2.Important Application Used

400

Which access control model applies the strictest access control and is typically used in military or mission critical applications?

Mandatory

400

What is the primary function of SANS?

To maintain the Internet Storm Center(a popular internet early warning system)

400

What are three threat intelligence information sharing specifications?

STIX ,TAXII,CybOX 

500

What device is usually the first line of defense in a defense-in-depth approach?

Edge Router

500

The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

Remote Access

500

A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?

Accounting

500

What does SANS stand for?

SysAdmin, Audit, Network, Security

500

What does TAXII stand for?

Trusted Automated Exchange of Indicator Information

M
e
n
u