Week 1-2
Week 3-4
Foundations
Ports
Focused Lately?
100

We covered requirements and features of 3 operating systems Windows 7, Windows 10 and ……...

What is

Windows 8.1

100

There are usually 3 models of cloud services to compare. Software as a service (SaaS), Infrastructure as a Service (IaaS) and What?

What is

Platform as a Service (PaaS)

100

 What version of ITIL are IT professionals currently utilizing?

what is 


4 or ITIL4

100

HTTP can be found in what port?

what is 


80

100

On Linux, there are two ways of setting permissions for users and groups;    with regular file permissions or with this

what is 


Access Control List

200

Directory service provided by Microsoft.  Helps organizations have a central administration over all the activities carried out in their networks.

What is


Active Directory

200

this practice is essentially about hacking your own system before someone else can

what is


Penetration Testing or Pen Testing


200

The means by which an organization is directed and controlled

what is


Governance 

200

Port 23 

what is 


Telnet

200

Linux startup process is the multi-stage initialization process performed during what?

 

what is


booting a Linux installation

300

WAN and LAN are short for what?

What is


Wide Area Network and Local Area Network

300

______ is traditionally associated as being an operating system for coders and programmers, but over the years there have been real attempts to make it more attractive to general consumers.

what is 


LINUX

300

Recommendations that guide an organization and its people on how to work flexibly in all circumstances

what is 


Guiding Principals 

300

DNS system is connected to what port?

what is


Port 53

300

_____  is an advanced access control mechanism built into most modern Linux distributions

what is


Security Enhanced Linux or SELinux 

400

 

Data encryption/decryption, Character/string conversion, Data compression and Graphic handling takes place on what layer of the OSI model


What is


layer 6 (Presentation) Layer

400

Bandwidth Hogs, too many devices, malfunctioning devices and overloaded servers will cause a network to have a_________?

what is


Bottleneck

400

which dimension focuses on relationships with external factors?

 

what is 


3 or Partners and Suppliers

400

Port 22


What is 


Secure Shell Protocol or SSH

400

It’s important to have different _________ to obtain higher data security in case if any disaster happens

 

what is 


Partitions  
500

This specific attack happens when an attacker took the advantages of weakness hidden in the domain name system.

What is


DNS Attack

500

DDOS Daily Double!!!!!!! Double Points total 1000


_____   _____ is an automated tool that allows organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks

what is


Vulnerability Scanner

500


DNS DAILY DOUBLE! Double the Points total 1000!!!


 This image represents what?

what is 


The service value system

500

Simple Mail Transport Protocol

what is 

 

Port 25
500

The symbolic mode     rwxr-xr-x    is equivalent to what numeric mode?

What is 


755