Control Numbers
Ports Protocols and Services
Christmas
Security+ 101
Holiday Movies
100

This control requires the use of accurate timestamps on all audit records to track events and determine their sequence, ensuring an accurate timeline of activities.

What is Time Stamps (AU-8)?

100

What ports is used for FTP?

What is the 20 and 21?

100

In this country, it’s traditional to eat KFC for Christmas dinner, a trend that started with a successful marketing campaign in the 1970s.

Who is Japan?  

100

This type of attack involves hackers encrypting a victim’s data and demanding payment, often in cryptocurrency, to restore access.

What is a ransomware attack?

100

This 1994 film stars Tim Allen as an ordinary man who accidentally becomes Santa Claus after the original Santa falls from his roof.

What is "The Santa Clause"??

200

Control Number for Vulnerability Scanning?

What is RA-5?

200

What port is used for NTP?

What is 123?

200

This traditional Christmas dessert, often soaked in alcohol and set on fire, is a favorite in the United Kingdom.

What is Christmas pudding?

200

This type of attack involves tricking users into revealing sensitive information, often through deceptive emails, websites, or messages.

What is phishing?

200

In this 2004 animated film, a magical train takes a boy on an extraordinary journey to the North Pole on Christmas Eve.


What is "The Polar Express"?

300

Control Number for Least Privilege?

What is AC-6?

300

What port is used for RDP?

What is 3389?

300

This reindeer’s name means “lightning” in German, and he works alongside Donner, whose name means “thunder.”

Who is Blitzen?

300

This cybersecurity principle ensures that sensitive data can only be accessed by authorized individuals.

What is confidentiality?

300

In this animated classic, a misfit reindeer with a glowing red nose becomes the hero of Christmas by leading Santa’s sleigh through the fog.

What is "Rudolph the Red-Nosed Reindeer"?

400

This DAAPM control ensures that only authorized users can access specific data by verifying their identity before granting access?

What is authentication(AC-5)?

400

What port is used for DNS?

What is 53?

400

This popular holiday drink is made with milk, cream, sugar, whipped egg whites, and egg yolks—and is often spiked with rum or brandy.

What is eggnog?

400

This process involves creating a digital fingerprint of a file or data to ensure its integrity and detect changes.

What is hashing?

400

In this 1947 classic, Kris Kringle is hired to play Santa at Macy’s but must go to court to prove he’s the real deal.

What is "Miracle on 34th Street"?

500

Control Number for Security Assessment?

What is CA-2?

500

What ports are used by default for splunk?

What is port 8000 (web services) and port 8089 (splunkd service)

500

This U.S. president declared Christmas a national holiday in 1870, alongside New Year’s Day and Independence Day.

Who is Ulysses S. Grant?

500

This framework, abbreviated as CIA, represents the core principles of cybersecurity: confidentiality, integrity, and this third principle.

What is availability?

500

This 1993 Tim Burton-produced film blends Christmas and Halloween, as Jack Skellington attempts to bring Christmas to Halloween Town.

What is "The Nightmare Before Christmas"?