Security Policies
Risks, Threats, Vulnerabilities!
Incident Response
Firewalls and network security
[Extra Credit]
100

The full definition for the CIA Triad.

What is Confidentiality, Integrity, and Availability? 

100

A exploitable flaw in design.

What is a vulnerabilit?

100

The team which responds to cyber incidents.

Who is the CIRT?

100

This protects a computer/network on one side from attackers and threats on the other side.

What is a firewall?

100

The three types of zones on a network.

What is Private, DMZ, and Public?

200

The requirements to receive classified information.

What is the need to know, signed NDA, proper clearance level, and eligibility?

200

The intentional intelligent act of an attacker attempting to enter our network.

What is a network attack?

200

This category deals with investigations……

What is category 8?

200

The network access controller used on a device via installed software.

What is a agent NAC?

200

The percentage of cyberattacks that could be stopped if we practices cyber hygiene best practices.

What is 90%!

300

Legacy information is not remarked or reclassified when transferred into control of this organization.

What is the Department of Defense?

300

When an bad actor changes records and entities within our system it is known by this name.

What is Data Diddling?!?!

300

Data captured (being lessons learned, root causes, and other problems) during the postmortem/post-incident analysis goes to these places.

Where is the MAJCOM and UNIT?

300

The definition of fuzzing as established by professor Tizmo PHD.

What is the process of checking for functionality by inputting random data to check for crashing, leaks, bugs, and vulnerabilities?

300

This measures our current state of readiness.

What is baselining?

400

The Air Force specific threat that isn’t malware or unauthorized access.

What is Fraud, Waste, and Abuse?

400

The social engineering tactic that targets a specific group or person commonly done through social media.

What is spear phishing?

400

The first steps directly after a Incident occurs, before the CIRT has been activated.

What is containing the affected system, and notifying the CIRT?

400

XSS uses this type of code to steal all my cookies!
And inject evil code straight into my apps TO STEAL MORE COOKIES!

What is JavaScript?

400

The old Russian man that steals your copper cables. He did this because you didn‘t secure the cable emanations.  

Who is TEMPEST?

500

All information systems need to be encrypted and secured according to this security policy.

What is COMSEC? (Or COMPUSEC)

500

Software hidden under from the administrators via an attacker to give them access to our system. Not a Trojan horse!

What is a root kit?

500

Coordination of cyber incidents should be done with these two agencies.

Who is CORA and AF-DAMO?

500

A firewall that sits on the edge of our network.

What is a hardware firewall?

500

The documentation that must be completed during preliminary response actions in accordance with OSI policy.

What is Chain of Custody documentation? 

M
e
n
u