Question
Network architectures with this property continuously verify devices each time they access resources rather than maintaining a network perimeter within which no authentication is needed. For 10 points each:
[10h] Name this kind of network architecture that, as codified by the NIST 800-207 standard, relies on a policy enforcement point to authorize each session attempting to access resources.
ANSWER: zero-trust architecture
[10m] A 2020 US government data breach resulted from Zerologon, a vulnerability in this company’s Netlogon protocol that allowed attackers elevation of privileges to the domain controller of this company’s Active Directory service.
ANSWER: Microsoft Corporation
[10e] These software vulnerabilities are valuable to hackers since they’re exploitable before being known to their vendors. Examples include the four in Microsoft Windows that Stuxnet took advantage of.
ANSWER: zero-day exploits
<Vishwa Shanmugam, Other Science - Computer Science>
Summary
2023 Chicago Open | 08/05/2023 | Y | 9 | 12.22 | 56% | 56% | 11% |
Data
I would prefer not to | Romanos IV Diogenes’ Macaroni Grill | 10 | 10 | 10 | 30 |
remembrance of lost time | Quasicrystal Silence | 0 | 0 | 10 | 10 |
Saint Peter Andre 3000 | Hang et al., Robert Browning | 0 | 0 | 0 | 0 |
Curse you, Periplus the Platypus! | Teach Us to Outgrow Our Ladness | 0 | 10 | 0 | 10 |
Don't be Afraid, the Clown's Afraid Too | Team Name Think Detail | 0 | 0 | 0 | 0 |
I prefer really not to speak. If I speak I’m in big trouble | The Canadians | 0 | 0 | 10 | 10 |
The Plague (anime)" was redirected to: "Oran High School Host Club | The Catastrophic Implosion of Packet Sub | 0 | 10 | 10 | 20 |
BHSU | wave2: trimming membership codes 9655377758gp | 0 | 10 | 10 | 20 |
[moderator voice] yes that is so tenpointscore! is your team feeling bonuspilled? | Evans Hall destruction awaiters | 0 | 10 | 0 | 10 |