Defense in Depth
Attack types
Backup/Restore
Server Protection
Ports
100

Related to cybersecurity what is the CIA triad for?

Confidentiality, Integrity, Availability

100

What is required for a virus to spread?

What is required for a virus to spread?

100

Which type of backup takes the longest to run?

Full backup

100

What is used to monitor and potentially block certain network traffic?

Firewall

100

HTTPS

443

200

A core security concept that dictates a user should only have access to the minimum level of resources and permissions necessary to perform their assigned tasks.

Principle of Least Privilege

200

What term characterizes how a worm spreads?

self replicating

200

Which backup will backup files as soon as the change is made?

Mirror or Copy Backup

200

If there is conflict between NTFS and Share permissions, what principle applies?

Most restrictive

200

SMTP

25

300

What is the best tool to mitigate the influence of a hacker?

Firewall

300

The best defense against a ransomware attack.

Regular Backups

300

It has been 7 days since the full backup.  I run backups every night.  What type of backup would take the longest tonight:  incremental or differential

differential

300

This type of firewall has few rules because it remembers requests made and allows the responses into the network.

Stateful firewall

300

What protocol uses port 3389?

Remote Desktop

400

Give an example of physical security related to protecting a server.

Locked in a server room, block ports on the server, locked server case

400

This type of attack is typically the result of bad programming that allows someone to bypass normal security protocols.

Backdoor

400

This backup may get larger each night or it may get smaller.

Incremental

400

What Windows tool should be implemented to prevent theft of a computer from exposing data? 

Bitlocker - Encrypt the hard drive

400

DNS

53

500

This type of system can detect malicious activity on the network and take action to stop the activity and notify the appropriate staff.

Intrusion Prevention System (IPS)

500

The best defense against a buffer overflow attack.

Data Execution Prevention

500

It has been 5 days since the last full backup.  I do incremental backups and I have lost my data.  How many restores will I need to run?

6 - the full backup and then all the incrementals.

500

Name one thing that can be done to harden a server.

Remove roles, disable services, remove accounts, rename built in accounts

500

What 2 protocols share the same port?

SFTP and SSH

M
e
n
u