Hello, how are you?
Identity Crisis
Stratus Report
The Best Offense is a good Defense
100

Networks that are found in an on-premises data center

What is a physical network

100

This uses what you know, what you have, and what you are

What is Multi factor authentication(MFA)

100

In default encryption, keys are comprised of this many bits

What is 256

100

This blocks specific websites and links from being access

What is blacklist

200

A computer located in an area with limited security that serves as "bait" to threat actors

What is a honeypot

200

This shares one credential across multiple applications

What is single sign on(SSO)

200

This cloud security control is an independent examination of services and security 

What is an Audit

200

This allows specific websites and links to be accessed

What is whitelist

300

Technology that enables authorized users to use an unsecured public network as if it were a secure private network

What is a VPN

300

This assigns access based on job responsibilities 

What is Role based access controls(RBAC)

300

The three functional areas of cloud computing 

What are Storage, Network, and Computing

300

This examines both outgoing and incoming traffic/packets 

What is a Firewall

400

A cloud-based service that creates a logically isolated virtual network,


What is a virtual private cloud(VPC)

400

This assigns access based on administrative control in labels or levels 

What is Mandatory access control(MAC)

400

This feature of cloud secrets management allows data to integrate with other secret management systems

What is extensibility

400

A process for steering unwanted traffic away from its intended destination to another device.

What is Sinkholing

500

A technology that virtualizes parts of the physical network so that it can be more quickly and easily reconfigured.


What is a software defined network(SDN)

500

This assigns access based on a combination of policies for object, subject, and environment

What is Attribute based access control(ABAC)

500

This software acts as a gateway between on-premises and cloud resources

What is cloud access security broker(CASB)

500

The process of dividing a network into small elements to provide the controls of separation and quarantining.

What is System isolation