Fire Walls
Hardening Targets
Indicators Of Compromise
Scripting And Automation
100

What is the difference between a IDS and IPS?

IDS detects  and IPS prevents

100

What is a major weakness for mobile devices?

They are always connected

100

what is the relevance of location in regards to an ioc?

"two people can't be in two places at the same time"

100

Define scripting?

Automation of tasks or a way of delivering instructions to a computer

200

What is Metadata?

Data that describes other data sources

200

Does an Operating System have a default security system?

No, OS are not installed with a default security system

200

In reference to the video name 3 of the indicator of compromise (ioc) symptoms?

unusual amount of network activity, change in file hash values, irregular international traffic, changes to DNS data, uncommon login patterns, and spikes of read requests

200

What would be two disadvantages to scripting?

complexity

cost

single point of failure

ongoing support

"technical debt" - may push problems further down the road

300

Name 2 details can be found in logs?

Blocked/allow traffic, Exploit attempts, Blocked URL categories, and DNS sinkhole traffic.

300

What is the difference between a service patch and pack?

A pack is multiple patches

300

Why would an attacker want to purposely lock out an account?

To attempt to use the helpdesk to reset the password

300

What is secure scaling? why is it different from normal scaling?

The inclusion of firewalls and other security devices along with components of normal scaling

400

Name 2 things that can be found in a firewall log?

Source/Destination IP, port numbers, and disposition

400

What is SCADA?

Supervisory control and data acquisition system

400

In reference to the video name a type of log to check, and what are you looking for?

Authentication logs - logons and logoffs

Firewall logs - show the outgoing transfer (IP's or timeframes)

400

What are two benefits to automation, what can it help with?

Enforce baselines, automatically install when identified

Standard infrastructure configurations, use a script to build a default configuration or add firewall rules

Employee retention, ease workload and automate mundane tasks

Reaction time and time of use, a script does not need time to start and can run 24/7

500

Name 4 things that can be found in Endpoint logs?

Logon events, policy changes, system events, processes, account management, and directory services

500

What are 3 ways you can protect cloud infrastructure?

Secure management workstation, use least privilege for management access, make backups, configure endpoint detection and response

500

What is an "out-of-cycle" log?

Occurring at an unexpected time

500

In regards to the video, why would scripting be relevant to an organizations email?

Email submissions can be scripted into a ticket