Pretty Kool Instructor
Several Ways of Verification
Wall of Fire
Smells Like Hostdog
Instructor Trivia (no points deducted)
100

PKI utilizes this type of encryption.

What is asymmetric encryption?

100

This device uses a time-based algorithm to generate authentication codes.

What is a RSA Token?

100

This type of firewall inspects individual data packets as they pass through; based on information such as IP addresses and port numbers.

What is a packet filtering/stateless firewall?

100

This is a program or device designed to intercept and capture network traffic.

What is a sniffer?

100

Mr. Tucker and Mr. R both consider this to be the most exhausting and overrated anime of all time.

What is One Piece?

200

This is what you would submit to a CA.

What is a Certificate Signing Request (CSR)?

200

This is a temporary authentication code valid for a single use or a short period.

What is a one time password (OTP)?

200

This type of firewall can prevent session hijacking by keeping track of active connections.

What is a stateful/dynamic firewall?

200

Sniffers typically operate in this mode.

What is promiscuous/passive?

200

Your fellow anime connoisseur Mr. Tucker considers this to be his favorite Studio Ghibli movie.

What is Howl's Moving Castle?

300

These are the four advantages/goals achieved through the use of PKI.

What is Authentication, Encryption, Non-repudiation, and Data Integrity?

300

These are the four categories of MFA.

What is Knowledge, Possession, Inherence, and Location?

300

This device acts as an intermediary between client and server, hiding internal network segments.

What is a proxy firewall/application level gateway?

300

These are the sniffer detection methods discussed in class.

What is ping method, DNS method, ARP method, latency method, and local host method?

300

Mr. Vavra won the NAGA Hawaii championship in this sport.

What is No-Gi Brazilian Jiu-Jitsu?

400

SSH is comprised of these three main components.

What is Transport Layer, User Authentication Layer, and Connection Layer?

400

This USB or NFC device stores cryptographic keys for authentication.

What is a security key?

400

A NGFW operates on these layers.

What is layer 3 (network), layer 4 (transport), and layer 7 (application)?

400

Sending an ICMP echo request with an incorrect MAC address would be an example of this sniffer detection method.

What is the ping method?

400

Mr. Tucker's father served in this branch of the US military.

What is the Army?

500

In the TLS handshake, this phase includes everything from ClientHello to creation of the "master secret".

What is the negotiation phase?

500

This device stores information (such as PKI certificates and digital fingerprints) on your CAC.

What is the Integrated Circuit Chip (ICC)?

500

These are the two versions of the vulnerability tool we discussed in class, one free and one paid.

What is Nessus Essentials and Nessus Professional?

500

DAILY DOUBLE!!!

The team who selected this may collaborate, and must decide how many points they would like to wager. There is no steal.

A CSR is comprised of these three components.

500

Mr. R once was a team USA athlete in this chilly sport.

What is bobsledding?

M
e
n
u