Cybersecurity
Zero-Trust
BC/DR
Hybrid Cloud
Potpourri
100

Cisco’s Anyconnect client has been rebranded to this new SSE client name.

What is Cisco Secure Connect?

100

Name the three domains that are discussed in ANM’s ZTA workshop?

Data Center, Branch, Remote Worker

100

The primary disaster scenario and reason for organizations to lose data today?

What is Ransomware

100

Name 2 cloud providers that are industry leaders.

What is 2 of any of the following:

AWS, Azure, GCP, Oracle

100

This next gen WAN technology has the ability to securely transmit data based on application preferences?

What is SDWAN

200

What is the 6-letter term for a group of computers networked together and used by hackers to steal information, disperse malware or conduct Denial of Service Attacks (DOS)?

What is a Botnet

200

Ping and OKTA are just 2 of these providers that offer this service.

What is Identity Management?

200

The top five Data Protection manufacturers that ANM  partners with.

What are Rubrik, Cohesity, Veeam, CommVault, Dell

200

Securing Customer Data in AWS is whose responsibility?  AWS or the Customer?

Customer

200

This industry term is the next generation VPN technology?

What is SSE?

300

What is the difference between Endpoint Protection and Antivirus.

Instead of using advanced techniques such as EDR, antivirus simply finds and removes known viruses and other types of malware

300

These 3 core principals are what make up the Zero Trust Architecture.

What is:

Never Trust, Always Verify

Context-based least privileged access

Assume Breach

300

The term for protecting data from change or deletion by a user or admin of a storage or backup system

What is immutability

300

AKS, ECS, EKS, Fargate are what type of services?

They are a container services.

300

This preferred vendor performs Incident Response services for our clients.

What is Blue Team Alpha?

400

What is the two word term for the type of cybersecurity breach in which a user is convinced to disclose secrets due to an exploitation of trust and reliance on cognitive biases? In short, this is a type of attack focused on human gatekeepers of information rather than the computer system itself.

What is Social Engineering.

400

This 3 letter acronym is deployed in branch office locations to profile and onboard IoT devices onto client’s network.

What is NAC?

400

The two minimum systems required for a DR site

What is storage and network.  
Compute and other services can be turned up in the event of a disaster.

400

Data Protection Vendors that ANM partners with can protect O365 Data

Rubrik, Cohesity, Veeam, and Commvault/Metallic

400

A client proposal should answer these 3 questions.

What is:

Why Invest, Why Now, Why ANM?

500

Providers can offer this service which includes threat hunting, monitoring, and response.

What is MDR?

500

ZTA aligns to this cybersecurity framework.

What is NIST 800-207?

500

These two acronyms are used in disaster recovery to define the time to recover operations after an outage and how much data loss can be tolerated

What is RPO and RTO

500

What is ANM's main superpower for Cloud Consulting

Cloud Connectivity

500

Launched in 2006, Amazon's EC2 stands for WHAT Compute Cloud?

What is Elastic Compute Cloud.