Cold site
What is a site that provides limited recovery services, such as an empty warehouse with electricity only?
PING
What ICMP command is used to check the connectivity between hosts on a local network?
Encryption, Anti-virus software, IDS, IPS, Firewalls, and privilege management.
What are Technical Controls?
My fingerprints
What is something I am in Access management?
MD5, SHA1, SHA2, SHA3, HMAC, RIPEMD
What are hashing algorithms?
Transference
What is it called when a company decides to buy insurance to guard against risk.
SIEM
What network monitoring tool allows for viewing consolidated system logs and information collected from multiple systems?
Awareness training, configuration and change management, contingency planning, media protection (hard drives, USB, etc), cameras/door locks/HVAC.
What are types of Administrative Security Controls?
My password.
What is something I know in access management?
What are key stretching algorithms?
Assessment
Analysis
Response
Mitigation
What are the four factors of Risk Management?
What is a command used to map the network path to a network resource.
What are types of Physical Security controls?
CAC card.
What is an example of something I have in Access management?
DES, 3DES, AES, BLOWFISH, TWOFISH, RC4
What are types of symmetric cyphers?
Single Loss Expectancy (SLE) * Annual Rate of Occurrence (ARO)
What is the Annual Loss Expectancy (ALE) formula?
SNMP
What protocol is used to collect network management information?
Hardening, security awareness and training, security guards, change management, and account disablement.
What are types of Preventive controls?
My location.
CA, RA, RSA, PKI certificates
What are components of Assymetric encryption?
MTTR
What is the acronym for the time it takes a component to recover from an incident?
Wireshark
What is protocol/network sniffer?
Log monitoring/audits, trend analysis/baselining, security audits, video surveillance, motion detection.
I type really slow and hunt and peck.
What is something I do in a unique way in Access management.
Data is encrypted in sections, not at the bit level.
What is block cypher?