Defense in Depth
Attack Types
Operating System Security
Network Device Security
Miscellaneous
100

What part of the CIA triad was compromised by the faulty Windows update?

Availability

100

What type of virus is able to change its code and adapt to different conditions?

Polymorphic Virus

100

What is the commonly used file system of Windows?

NTFS (New Technology File System)

100

What protocol turns HTTP into HTTPS?

SSL (Secure Socket Layer) or TLS (Transport Layer Security)

100
What is the less secure and currently obsolete form of remote connection?

Telnet

200

What security practice prevents dumpster diving?

Document Shredding

200

What attack disrupts availability by overloading systems?

Denial of Service (DoS)

200

Recording logon attempts, system events, and file access is called what?

Auditing

200

What are logical segmentations of an internal network?

VLANs

200

What is the volatile form of storage within your browser called?

Cache
300

IDS (Intrusion Defense System) is what kind of security control?

Technical

300
What attack triggers code based on specific conditions being satisfied?

Logic Bomb

300

What is an administrative security feature in Windows that controls authorization within the operating system?

User Access Control (UAC)

300

What is the first step in dealing with an infected system?

Quarantine

300

What is it called when a malicious data packet moves past firewall security with no alert?

False Negative

400

Type of backup that captures all changed data since the last backup

Incremental Backup

400

What attack uses "<script>" within a website?

Cross-Site Scripting (XSS)
400

What is a commonly used disk encryption program?

Bitlocker

400

What is the main security feature of VPNs other than encryption?

Tunneling/Encapsulation

400

What attack redirects users to illegitimate websites to harvest credentials?

Pharming

500

What is the security concept that all parties involved cannot deny the authenticity of their participation?

Non-Repudiation

500

What kind of spyware records the computer input of victims?

Keyloggers

500

What authentication protocol allows for authentication over an unsecure network?

Kerberos

500

What kind of firewall thoroughly examines the data in packets to assess malicious activity?

Stateful
500

What stores user-specific data on a web page session?

Cookies