Question

Network architectures with this property continuously verify devices each time they access resources rather than maintaining a network perimeter within which no authentication is needed. For 10 points each:
[10h] Name this kind of network architecture that, as codified by the NIST 800-207 standard, relies on a policy enforcement point to authorize each session attempting to access resources.
ANSWER: zero-trust architecture
[10m] A 2020 US government data breach resulted from Zerologon, a vulnerability in this company’s Netlogon protocol that allowed attackers elevation of privileges to the domain controller of this company’s Active Directory service.
ANSWER: Microsoft Corporation
[10e] These software vulnerabilities are valuable to hackers since they’re exploitable before being known to their vendors. Examples include the four in Microsoft Windows that Stuxnet took advantage of.
ANSWER: zero-day exploits
<Vishwa Shanmugam, Other Science - Computer Science>

Back to bonuses

Summary

2023 Chicago Open08/05/2023Y912.2256%56%11%

Data

I would prefer not toRomanos IV Diogenes’ Macaroni Grill10101030
remembrance of lost timeQuasicrystal Silence001010
Saint Peter Andre 3000Hang et al., Robert Browning0000
Curse you, Periplus the Platypus!Teach Us to Outgrow Our Ladness010010
Don't be Afraid, the Clown's Afraid TooTeam Name Think Detail0000
I prefer really not to speak. If I speak I’m in big troubleThe Canadians001010
The Plague (anime)" was redirected to: "Oran High School Host ClubThe Catastrophic Implosion of Packet Sub0101020
BHSUwave2: trimming membership codes 9655377758gp0101020
[moderator voice] yes that is so tenpointscore! is your team feeling bonuspilled?Evans Hall destruction awaiters010010