Advanced Networking
Protocols & Services
Advanced Threats & Tactics
Security Architecture
Risk, Compliance & Response
100

This IPv6 address type is the equivalent of a private IPv4 address.

What is a Unique Local Address (ULA)?

100

This protocol is used to securely administer remote devices and operates on TCP port 22.

What is SSH?

100

This is a type of phishing that targets high-profile individuals.

What is spear phishing?

100

This zone separates an organization's internal network from untrusted external networks.

What is a DMZ?

100

This is the likelihood that a threat will exploit a vulnerability.

What is risk?

200

This dynamic routing protocol supports classless routing and uses link-state advertisements.

What is OSPF?

200

SNMP uses these two ports for communication.

What are UDP 161 and 162?

200

This technique involves manipulating packet headers to mask the origin of network traffic.

What is IP spoofing?

200

These are used to define what traffic is allowed or denied through a firewall.

What are access control lists (ACLs)?

200

This document outlines how to restore IT services after a disruption.

What is a disaster recovery plan?

300

This protocol is used for loop prevention in a Layer 2 network.

What is Spanning Tree Protocol (STP)?

300

This email protocol downloads messages and typically deletes them from the server.

What is POP3?

300

This type of attack exploits a trust relationship by injecting malicious input into a database query.

What is SQL injection?

300

This type of security model grants resources based on job assignment needs.

What is RBAC (Role Based Access Control)?

300

This regulation governs the protection of patient health information.

What is HIPAA?

400

This WAN technology allows packet-switched communication over a public network using tunnels.

What is MPLS (Multiprotocol Label Switching)?

400

This protocol secures communication over VPNs by authenticating and encrypting each IP packet.

What is IPsec?

400

This is an attack where the hacker inserts themselves into an ongoing communication session.

What is a man-in-the-middle (MITM) attack?

400

This architecture uses isolated networks to contain devices with different security needs.

What is network segmentation?

400

This is a detailed analysis of potential threats, vulnerabilities, and consequences

What is a risk assessment?

500

This type of NAT maps multiple private IPs to a single public IP with unique port assignments.

What is PAT (Port Address Translation)?

500

This is the protocol suite used for network authentication and uses a ticket-granting system.

What is Kerberos?

500

This advanced attack uses malware embedded in legitimate-looking software to gain long-term access to a system.

What is a Trojan with a persistent backdoor or APT (Advanced Persistent Threat)?

500

This access model uses policies, tags, and context rather than roles or groups.

What is Attribute-Based Access Control (ABAC)?

500

This framework is published by NIST and provides guidelines for improving cybersecurity posture

What is the NIST Cybersecurity Framework?

M
e
n
u