What is it called to provide a user with only sufficient access to do their job? "bare minimum"
Principle of Least Privilege
What do we call our contractual agreements in regards to technical support to our client?
SLAs (Service Level Agreements)
Physical Security includes..... Name at least 2.
1. Badges with proximity cards
2. Bio-metric scanners
3. Fences
4. Security Guard Staff
5. Security Cameras
What do you call an attack that is meant to overload the victim to the point of breaking or causing a stoppage?
DoS - Denial of Service
An attack where the threat agent uses packet sniffers to capture data packets and alter the message before it reaches its destination.
Man-in-the-middle-attack
A user copies files from his/her desktop to a USB flash drive. What type of security risk is this?
Confidentiality
A policy that must be acknowledged by all employees using the company's assets. This policy defines appropriate and inappropriate use of such assets.
Acceptable Use Policy
Name an item that is commonly provided to laptop users to protect their asset.
Cable lock
Browsing a companies website in efforts to plan for an attack is an example of?
Passive Reconnaissance
What do you call the process of the attacker changing his/her identity to reflect on another user or source?
Spoofing
Before sending a message, you encrypt the hash using a private key. You then attach the encrypted has as a digital signature. This ensures your message is received untampered with as intended.
Integrity
What is the best way to prevent Social Engineering?
Awareness - Educate your employees, training, elearning modules.
Which fire extinguisher class is best suited for electrical fires dealing with computer components?
Class C
A long ICMP packet or a blank that is larger than 65,536 bytes is also known as....
Ping of Death
What do you call driving or walking around looking for vulnerable WiFi networks?
War driving
A misconfigured Server, missing updates and patches, and weak passwords are examples of what?
Vulnerability
What should you do or have as part of your SOP for offboarding a terminated employee? Name at least 3.
1. Remove access to domain (AD account).
2. Remove physical access to building (keys, proximity cards).
3. Remove access to exchange or email account.
4. Remove access to all applications internal and external.
5. Recover company assigned assets.
You are arriving at work and coming in through the back entrance. An electrician is waiting outside the door and asks you to let him in so he can fix the light fixtures in the break room. What is the appropriate action to take?
Direct him to the front entrance and ask him to check in with security. He should have a visitor badge and be escorted at all times. Report the incident to Operations Facilities and Security as soon as you're in the building.
What do we call a network segment where we allow less security? Typically used in a scenario where external traffic needs to be allowed like for a web server or application.
DMZ - Demilitarized Zone
What do we call when we block everything on the internet using a FW except what is deemed acceptable by the contract?
Whitelist
You're implementing an Access Control List with users that you specifically authorize for access to a company resource. Anyone not on the list should be prevented from having access.
Explicit Allow, Implicit Deny
What do we call a plan that is put into place after much risk assessment to remedy business production following a disaster or catastrophic event?
BCDR Plan or Business Continuity and Disaster Recovery Plan.
What do we call the devices in our Data Centers that are meant to let us know when we have environmental risks like high humidity and temperature? Or what is the name of the one I showed you in class?
Environmental Monitors
Watchdog 100
What is the principle of transmitting private traffic through a public communication medium?
Tunneling
What type of DoS attack affects a name Server by incorrectly mapping host names and IP addresses?
DNS Poisoning