Networking
Policies and Plans
Threats
Authorization and Backup
Encryption and Attacks
100

Wireless networking topology setup requires the same channel name and SSID.

What is Ad-Hoc standalone network architecture?

100

Policies that exist on AWS IAM identity (user, role, group).

What are inline Policies?

100

SIEM solutions to take control of chaos, gain in-depth knowledge of threats, eliminate false positives, and implement proactive intelligence-driven defense.

What are threat intelligence feeds?

100

RAID level that does not provide data redundancy.

What is RAID 0?

100

Encryption algorithm used by WPA3 encryption.

What is AES-GCMP 256?

200

While performing a network scan, the network admin identified that somebody had captured the confidential e-mails conversions related to the tender. Upon further investigation, the admin discovered that one of the switch ports was left open and an employee had plugged into the network using an Ethernet cable.

What is Network Sniffing?

200

Examines the probability of the exposure to risk or impact status.

What is risk tracking?

200

Indicator of an attack.

What is remote code execution?

200

Authorization allows others to access a resource on someone else's behalf.

What is implicit authorization?
200

Secure storage for the keys used to encrypt data at rest in Azure services.

What is Azure Key Vault?

300

The layer of defense-in-depth architecture that is used for audits and security implementation across an entire network.

What is the application layer?
300

Provides target for designing a Business Continuity Plan and a Data Recovery Plan.

What is a Recovery Point Objective (RPO)?

300

Execute or test the untrusted or untested programs or code without risking the OS or host system.

What is application sandboxing?

300

Authentication will assist in not having to remember different passwords for multiple servers.

What is a single sign-on (SSO)?

300

An attack based on the probability that if a hashing process is used for creating a key, then the same is used for other keys.

What is a birthday attack?

400

A device that is used to inspect outbound and inbound traffic of a network for suspicious patterns.

What is a firewall?

400

Examines Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for a disaster recovery strategy.

What is a Business Impact Analysis?

400

A way to protect a web server from an attacker accessing information even if attacked.

What is a Demilitarized Zone (DMZ)?

400

Built-in Windows security component, such as AppLocker.

What is using path rule?

400

An attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

What is a Man-in-the-Middle Attack (MIM)?

500

A device that blocks specific websites, such as social media sites, shopping sites, and streaming sites.

What is an internet content filter?

500

Defines the extent of an interruption to normal business operations and the loss of revenue.

What is a Recovery Time Objective (RTO)?

500

The phase of vulnerability management that deals with patching when a vulnerability is discovered.

What is remediation?
500

The process of accepting logs from heterogeneous sources with different formats and converting them into a common format.

What is log normalization?

500

A wireless encryption that provides enhanced password protection, secured IoT connections, and encompasses stronger encryption techniques 

What is WPA3?