Security Risks and Security Basics
Policies, Procedures, and Awareness
Physical Threats
Perimeter
Perimeter Continued...
100

What is it called to provide a user with only sufficient access to do their job? "bare minimum" 

Principle of Least Privilege

100

What do we call our contractual agreements in regards to technical support to our client?

SLAs (Service Level Agreements)

100

Physical Security includes..... Name at least 2. 

1. Badges with proximity cards

2. Bio-metric scanners

3. Fences

4. Security Guard Staff

5. Security Cameras

100

What do you call an attack that is meant to overload the victim to the point of breaking or causing a stoppage?

DoS - Denial of Service

100

An attack where the threat agent uses packet sniffers to capture data packets and alter the message before it reaches its destination. 

Man-in-the-middle-attack

200

A user copies files from his/her desktop to a USB flash drive. What type of security risk is this?

Confidentiality

200

A policy that must be acknowledged by all employees using the company's assets. This policy defines appropriate and inappropriate use of such assets. 

Acceptable Use Policy

200

Name an item that is commonly provided to laptop users to protect their asset.

Cable lock

200

Browsing a companies website in efforts to plan for an attack is an example of?

Passive Reconnaissance

200

What do you call the process of the attacker changing his/her identity to reflect on another user or source?

Spoofing 

300

Before sending a message, you encrypt the hash using a private key. You then attach the encrypted has as a digital signature. This ensures your message is received untampered with as intended.

Integrity

300

What is the best way to prevent Social Engineering?

Awareness - Educate your employees, training, elearning modules. 

300

Which fire extinguisher class is best suited for electrical fires dealing with computer components? 

Class C

300

A long ICMP packet or a blank that is larger than 65,536 bytes is also known as....

Ping of Death

300

What do you call driving or walking around looking for vulnerable WiFi networks?

War driving

400

A misconfigured Server, missing updates and patches, and weak passwords are examples of what?

Vulnerability 

400

What should you do or have as part of your SOP for offboarding a terminated employee? Name at least 3. 

1. Remove access to domain (AD account).

2. Remove physical access to building (keys, proximity cards).

3. Remove access to exchange or email account. 

4. Remove access to all applications internal and external.

5. Recover company assigned assets.  

400

You are arriving at work and coming in through the back entrance. An electrician is waiting outside the door and asks you to let him in so he can fix the light fixtures in the break room. What is the appropriate action to take?

Direct him to the front entrance and ask him to check in with security. He should have a visitor badge and be escorted at all times. Report the incident to Operations Facilities and Security as soon as you're in the building. 

400

What do we call a network segment where we allow less security? Typically used in a scenario where external traffic needs to be allowed like for a web server or application. 

DMZ - Demilitarized Zone

400

What do we call when we block everything on the internet using a FW except what is deemed acceptable by the contract?

Whitelist

500

You're implementing an Access Control List with users that you specifically authorize for access to a company resource. Anyone not on the list should be prevented from having access. 

Explicit Allow, Implicit Deny

500

What do we call a plan that is put into place after much risk assessment to remedy business production following a disaster or catastrophic event?

BCDR Plan or Business Continuity and Disaster Recovery Plan.

500

What do we call the devices in our Data Centers that are meant to let us know when we have environmental risks like high humidity and temperature? Or what is the name of the one I showed you in class?

Environmental Monitors 

Watchdog 100

500

What is the principle of transmitting private traffic through a public communication medium?

Tunneling

500

What type of DoS attack affects a name Server by incorrectly mapping host names and IP addresses?

DNS Poisoning