Operating Systems
Security Software
Security Layers
Bonus
Daily Double
100

Technology created by Microsoft that provides a variety of network services

What is Active Directory

100

What are two common types of passwords attacks?

What is Cracking and Brute Force

100

What does CIA stand for?

What is Confidentiality, Integrity, and Availability.

100

A type of site security that requires a person's identity to be proven and authenticated is called what?

What is Access Control.

100

The process of eliminating a risk by choosing not to engage in an action or activity is called what?

What is Risk Avoidance. 

200

Electronic document that contains an identity, such as a user or organization name

What is a digital certificate

200
You are the head of the corporate security department, and the Microsoft team has asked you for some assistance in setting the password controls on their new stand-alone server. Which Administrative Tool should you use to configure these settings?

What is Local Security Policy

200

What are you violating in CIA when HIPPA is broken?

What is Confidentiality

200

Fingerprint Scanners, Retinal Scanners, Voice Recognition Systems are apart of what type of security?

What is Bio Metric Technologies

200

What does Non repudiation do?

What is prevents one party from denying the actions it has carried out. 

300

Card with embedded integrated circuits consisting of nonvolatile memory storage

What is a smart card

300

What are two new features introduced in Windows Server 2008 that permit that use of fine-gained password policies?

What is Password Settings Container and Password Setting Object

300
What is a physical or logical device used to capture keystrokes. 

What is Keylogger

300

An attack that relies on having a user execute a malicious script embedded in a web page is which kind of attack?

What is Cross Site Scripting
300

What enables a user log on to a computer and domain?

What is User Account.

400

What are the base NTFS permissions

What is read, execute, and list folder contents.

400

A ____ account is one type of account you can configure so that the password does not expire.

What is Administrator

400

Security Cameras, Gate with access badge reader, Guard Patrols, Gate with guard are all what?

What is Perimeter Security

400

Which three elements and issues should be considered when deciding whether to use a software or hardware firewall?

What is Host Operating System, Application Conflicts, and Stability. 

400

What is the process identifying an individual called?

What is Authentication. 

500

Network authentication protocol, allows host to prove their identity over a non secure network. 

What is Kerberos

500

A set of rules that allows an administrator granular control over the configuration of objects in Active Directory (AD), including user accounts, operating systems, applications, and other AD objects, is known as a ________.

What is Global Policy Object (GPO)

500

This is a phrase meaning the security discipline that requires a particular user system, or application be given no more privilege than necessary to perform its function

What is the Principle of Least Privilege.

500

The best way to simplify a complex environment is to standardize a limited number of account types, what is this process called?

What is Account Standardization?

500

Interconnection model is a conceptual model that characterizes and standardizes the communication functions of telecommunication or computing system without regard to its underlying internal structure and tech. What is the name of this model?

What is the OSI Model.