Related to cybersecurity what is the CIA triad for?
Confidentiality, Integrity, Availability
What is required for a virus to spread?
What is required for a virus to spread?
Which type of backup takes the longest to run?
Full backup
What is used to monitor and potentially block certain network traffic?
Firewall
HTTPS
443
A core security concept that dictates a user should only have access to the minimum level of resources and permissions necessary to perform their assigned tasks.
Principle of Least Privilege
What term characterizes how a worm spreads?
self replicating
Which backup will backup files as soon as the change is made?
Mirror or Copy Backup
If there is conflict between NTFS and Share permissions, what principle applies?
Most restrictive
SMTP
25
What is the best tool to mitigate the influence of a hacker?
Firewall
The best defense against a ransomware attack.
Regular Backups
It has been 7 days since the full backup. I run backups every night. What type of backup would take the longest tonight: incremental or differential
differential
This type of firewall has few rules because it remembers requests made and allows the responses into the network.
Stateful firewall
What protocol uses port 3389?
Remote Desktop
Give an example of physical security related to protecting a server.
Locked in a server room, block ports on the server, locked server case
This type of attack is typically the result of bad programming that allows someone to bypass normal security protocols.
Backdoor
This backup may get larger each night or it may get smaller.
Incremental
What Windows tool should be implemented to prevent theft of a computer from exposing data?
Bitlocker - Encrypt the hard drive
DNS
53
This type of system can detect malicious activity on the network and take action to stop the activity and notify the appropriate staff.
Intrusion Prevention System (IPS)
The best defense against a buffer overflow attack.
Data Execution Prevention
It has been 5 days since the last full backup. I do incremental backups and I have lost my data. How many restores will I need to run?
6 - the full backup and then all the incrementals.
Name one thing that can be done to harden a server.
Remove roles, disable services, remove accounts, rename built in accounts
What 2 protocols share the same port?
SFTP and SSH