Kerberos port?
88
Ipsec port?
500
Rdp port?
3389
What does dns protect against?
How to secure email?
What is File integrity Monitoring (FIM)?
Establishes a baseline of normal file and system configurations. Alerts when it changes.
What ensures that every remote device is fully patched and uses agents carried out by the health authority (HAuth)?
Network access control (NAC)
What is XDR?
Extended detection and response.
How does EDR work?
Data collection
Detection-signature based and behavior analysis
Alerting
Response - tools that the cyber team can use to resolve
XDR components?
What is the active directory and its protocol?
Microsoft provisioning tool
Lightweight directory access protocol (LDAP)
What is a SID?
Security identifier.
Object identifier in active directory
What language is used for federation services?
Security assertion markup language (SAML)
What does kerberos use to obtain service tickets?
TGT
Ticket granting ticket
Token
3 sso options
Attestation methods for system interoperability?
What is mandatory access control (MAC) and what are the management roles?
Mandatory access control
What is RBAC?
Role based access control
What is ABAC?
Attribute based access control.
Location, job title, access time etc…
What is discretionary based accessed control (DAC)?
Owner gives access. Uses ACL’s
What is soft authentication? Give examples.
Leverages intangible assets like passwords, pins, or mobile authentication. Only something they know. Can be intercepted
What is two-factor auth?
Having a token (phone), something you have with a password
What is multi factor auth?
Something you have
Something you do
Something you know
What is NIST?
National Institute of standards and technonlogy.