(S) Server Hardening
(S) Environmental Control
(S) Physical Security
(DR) Backup Techniques
(DR) Planning
100

A collection of tools, techniques, and best practices to reduce vulnerability in technology applications, systems, infrastructure, firmware, and other areas.

With the goal of reducing security risk by eliminating potential attack vectors and condensing the system’s attack surface.

What is server hardening?

100

The most secure form of disposal of data.

What is physical destruction?

100

Even before you lock down the servers, in fact, before you even turn them on for the first time, you should ensure that there is one on the doors of your server room.

What is door locks?

100

This backup technique ensures all data is backed up and the archive bit has been reset.

What is a full or normal backup?

100

This plan considers all aspects that could essentially be affected by disaster and prioritizes them.

What is a business continuity plan?

200

Keeping security patches up to date is part of which aspect of server hardening?

What is OS Hardening?

200

When the server room is too dry you run the risk of this.

What is electrostatic discharge or ESD?

200

Utilizing scanning technology, this type of physical security identifies who you are.

What is bio-metric security measures?



200

This backup technique ensures all data is backed up and the archive bit has NOT been reset.

What is a copy backup?

200

This plan captures every possible disaster scenario that could happen, and then lays out what are the steps to get the business back up and running again.

What is a disaster recovery plan?

300

These are the three broad aspects of server hardening.

What is OS hardening, application hardening, and hardware hardening?

300

An Uninterruptible Power Supply is meant to allow Server administrators to do this with servers in the event of an outage

What is a graceful shutdown?

300

Locking the door to the server room is a good first step, but someone could break in, or someone who has authorized access could misuse that authority. You need a way to know who goes in and out and when.

What is video surveillance or log book?

300

This backup type creates a mirror copy of the source data. When a source file is deleted, that file is also deleted in the mirror backup automatically.

What is a mirror backup?

300

This backup site type that features an equipped data center but no customer data.

What is a warm site?

400

A setting in found in the BIOS that controls whether a computer in a low power state can connect to the network. If a network signal comes to the computer, its boots up.

What is Wake-on-LAN or WOL?

400

An image of deleted data still remains on a hard drive when I do this.

What is a soft wipe?

400

Who I am, What I have, what I know keeps me secure. I use this technology to combine all of these things to ensure I am the only one who sees my data.

What is multi-factor authentication?

400

This captures only the changes made since the last incremental backup. Saves both time and storage space, and ensures that your backup is up to date.

What is incremental backup?

400

This data replication method uses multiple servers that are acting or providing one service as a single entity. If one server goes down, other servers are acting as backups

What is server-to-server replication?

500

Implementing a BIOS Password pertains to this to this aspect of server hardening.

What is hardware hardening?

500

This security feature of PDU's associates a PDU with a rack and signals an alarm if a server is accessed.

What is a case alarm?

500

I am like NSX but a physical representation.

What is a mantrap?

500

This captures only the changes made since the last full backup, not since the last differential backup. This requires more storage space, but ensures an easier, more reliable restore.

What is a differential backup?

500

This document combines both a business continuity plan and a disaster recovery plan.

What is a business impact analysis?