What protocol uses port 80 and is it secure or not?
HTTP and it is not secure
Social Engineering
Security Information and Event Manager (SIEM)
What type of malware disguises itself as a legitimate program?
Trojan
What is the CIA triad?
Confidentiality, Integrity, Availability
What protocol is used to securely connect to a remote system and uses port 22?
Secure Shell (SSH)
What type of attack involves trying every possible combination of characters to guess a password?
Brute-Force Attack
What systems monitor network or host activity for malicious behavior and can alert or block on attacks?
Intrusion Detection / Prevention System (IDS/IPS)
What type of malware spreads automatically across networks without user interaction?
Worm
What is MFA?
Multi-Factor Authentication
What does DNS stand for, what does it do and what port does it run on?
Domain Name System translates human readable domains into IP addresses. It runs on port 53
SQL Injection
This team is responsible for detecting, investigating, and responding to cybersecurity incidents within an organization.
Incident Response Team
What malware encrypts a victim's files and demands payment to restore access
Ransomware
What is RBAC?
Role-Based Access Control
This device forwards packets based on MAC address
Switch
This attack tricks users into connecting to a fake Wi-Fi network that looks legitimate
An Evil Twin Attack
What security tool continuously monitors endpoints to detect, investigate, and respond to suspicious activity?
EDR, Endpoint Detection and Response
This type of malware records keystrokes to steal sensitive information like passwords
Keylogger
What is a VPN?
Virtual Private Network
What protocol is used to automatically assign IP addresses to devices on a network?
Dynamic Host Configuration Protocol (DHCP)
MITRE ATT&CK framework
What is the 2nd step of the Incident Response Plan?
Identification - detecting and confirming an incident
What type of adversary is highly sophisticated and is known for developing advanced malware
Nation-State actors
What is the IAAA?
Identification, Authentication Authorization, and Accounting