CISSP
AWS
Disaster Recovery
Cryptography
Shooting Trouble (Not Alec Baldwin)
100

Sounds like a Federal spy agency

What is CIA?

100

Its your responsibility, it is our responsibility, it is AWS's responsibility.

What is the "shared responsibility model?"

100

I said BIA! Not CIA! What do I mean?

Business Impact Assessment.

100

I have a public key and a private key. What type of encryption method am I using? Examples or technologies.

SSL, PKI, PGP

100

Name one networking command you might use to check access to another host. (Remember, Hunt for Red October...)

Ping. One ping only.

200

A clear text protocol sends what unencrypted? Give an example.

User ID and Password. TELNET, HTTP, FTP.

200

An S3 bucket can be used for storage.  What other features does an S3 bucket offer?

File system access with Storage GW, Web Site with CDN

200

RTO and RPO, mean what?

Resumption Time Objective, Resumption Point Objective.

200

Bob just completed his code assignment and checked it into GitHub.  He had done testing with his public and private key.  He included the public and private key in the GitHub push to the public repository.  Is there a problem?

Yes.  Bob should NOT have published his private key.  By publishing the private and public keys, hackers can gain access to his code or the information his code is processing.

200

You want to send Melanie Griffith a text.  But you are concerned if it is secure.  Are SMS text messages encrypted by default?

No.

300

What does ALE mean? (Hint- it isn't beer)

Annualized Loss Expectancy

300

AWS AuroraDB is this kind of database...

What is SQL, relational, like MySQL

300

What is a risk of using an incremental backup?

One of the incremental backups could fail, corrupting the backup.  

300

Something you know, something you have, something you are.  Give an example of something you have.

MFA, Hard token, One time pad

300

You are really concerned about email security on the movie set of "Rust."  You encrypted the email.  Now you are setting up email signing.  What type of technology/PKI would you use?

X.509 certificate for secure signing of email.

400

It is a simple substitution cypher used as far back as ancient Roman times.

What is ROT 13.

400

I want to connect my VPC in my account to your VPC in your account, what could we use?

What is VPC peering? What is a transit GW?
400

You can transfer risk.  Give an example.

Insurance policy.  Contracted disaster recovery site/service.

400

Give an example of a "one time pad."

A code or symbol on a calendar pad that changes each day.  A page in a book that changes each day. Use a code once and throw away.

400

You need to launch your bombers off the deck of the USS Hornet to bomb Japan.  But you see Japanese spy boats!  You try to trick them by sending a known word in their cipher.  What are you trying to do?

Get them to transmit that word with other words in the cipher so you can detect more encrypted words / characters and break the code

500

It is a robust network protocol that uses all seven layers and is based on an international standard, before TCP/IP

What is X.25

500

You want move your ENTIRE Enterprise data center with MASSIVE amounts of storage to AWS and it needs to be done ASAP.  What service does AWS offer?

What is a large truck and trailer? What is Snowmobile?

500

In a disaster recovery situation, you tell your boss you want to bring up the most critical system first.  He says you are wrong!  Which system is first

Least critical systems first.

500

If I say "S Boxes" and "P Boxes" what do the "S" and the "P" mean?

S is Substitution and P is permutation.

500

You are left alone in a the Alaskan wilderness in a cabin that has Internet access via a satellite.  A hungry bear is outside and wants to eat you.  Alec Baldwin is outside and he wants to shoot you.  But it is raining hard-- will the satellite have problems?

Yes. Probably rain fade interference.