Defense in Depth
Cryptography
Logging & Monitoring
Lil bit of everything
Attacks
100

This principle ensures that users only have the minimum access required to perform their job.

What is Principle of Least Privilege?

100

Type of encryption algorithm in which the encryption key is the same as the decryption key

What is Symmetric encryption?

100

What severity level in syslog is classified as an emergency?

What is level 0?

100

The 3rd phase of the incident response?

What is containment?

100

This type of malware disguises itself as legitimate software to gain unauthorized access to a system.

What is a Trojan?

200

This type of security control detects and blocks malicious traffic before it enters the internal network.

What is an Intrusion Prevention System (IPS)?

200

This asymmetric encryption algorithm is widely used for secure data transmission online.

What is RSA?

200

A log analysis technique that detects anomalies based on predefined patterns.

What is Signature-Based Detection?

200

The principle that assumes a network is always at risk and requires continuous verification.

What is Zero-Trust?

200

This type of attack involves intercepting and altering communications between two parties.

What is Man In The Middle Attack?

300

This security mechanism isolates network segments to limit access between different areas.

What is Network Segmentation?

300

This hashing algorithm was deprecated due to vulnerabilities but was commonly used in older systems.

What is MD5?

300

This type of log records user access attempts, including successful and failed logins.

What is an Authentication Log?

300

More expensive to implement than symmetric algorithms.

What are Asymmetric Algorithms?

300

This type of attack targets the domain name system (DNS) to redirect traffic to malicious websites.

What is a DNS spoofing attack?

400

A security mechanism that isolates applications or processes to limit their impact if compromised.

What is Sandboxing?

400

A cryptographic attack where the attacker finds two different inputs that produce the same hash value.

What is a Collision Attack?

400

This method of threat detection identifies unusual patterns in system behavior rather than relying on known attack signatures.

What is anomaly-based detection?
400

This attack exploits the trust relationship between two systems, allowing attackers to send unauthorized requests or commands.

What is a cross-site request forgery (CSRF)?

400

This type of attack occurs when data overwrites adjacent memory, potentially allowing an attacker to execute arbitrary code.

What is a buffer overflow attack?

500

This security approach ensures that even if one layer of defense fails, additional controls are in place to mitigate the risk.

What is defense-in-depth?

500

A cryptographic protocol used to securely exchange keys over an insecure channel.

What is Diffie-Hellman?

500

This logging mechanism ensures that logs cannot be altered or deleted, preserving their integrity for forensic analysis.

What is WORM storage?

What is write-once, read-many (WORM) storage?

500

A security measure designed to help protect sensitive information by restricting access based on a user's role or need-to-know basis.

What is Role-Based Access Control (RBAC)?

500

A sophisticated attack where malicious software hides its presence by altering its code or behavior to avoid detection by antivirus software.

What is a polymorphic virus?