Hotline Bling
Common Access Card Card
Smells Like Hostdog
Give Me Your Social
Scooby-Doo and the Cyber Chase
100

This is the practice of intercepting and analyzing data packets transmitted over a wireless network.

What is Wi-Fi Sniffing?

100

This is the encryption used on all common access cards.

What is 2048-bit?

100

Having multiple routers, low memory space, poorly optimized backend databases, a mixture of transmission mediums, and/or DNS server errors can lead to this issue.

What is network latency?

100

This method of social engineering involves a malicious actor offering services with the expectation that the victim will reciprocate in some capacity.

What is Quid Pro Quo?

100

This security concept is used to compare the state of a system between two different points in time, potentially identifying a difference that might indicate the presence of malware.

What is establishing a baseline?

200

These are the four main threats to mobile device security.

What are application-based, web-based, network-based, and device-based?

200

This component of a CAC contains the PIN and one or more PKI certificates.

What is the integrated circuit chip (ICC)?

200

This indicator measures how long it takes a packet to travel from it source to its destination and then back to the source.

What is Round Trip Time (RTT)?

200

Without my knowledge, an individual followed me into a secure facility by catching the door before it closed behind me. This term represents the technique used by the unauthorized individual.

What is tailgating?
200

Changes to personal files, common applications, wallpapers, and/or AutoStarts are all forms of this.

What are user specific changes?

300

Implemented by Apple on iOS and macOS devices, this security feature enforces secure connections between apps and web services.

What is App Transport Security (ATS)?

300

Featured on the back of the CAC, this barcode type contains 40 possible characters with one being used for a stop/start pattern.

What is Code 39?

300

This layer 2 protocol is not very secure, and is very susceptible to spoofing and MITM attacks.

What is Address Resolution Protocol (ARP)?

300

A person either with malicious intent, or who might simply be negligent, that has access to assets within an organization that may carry a significant impact if compromised.

What is an insider threat?

300

On Windows machines, this command will display active TCP connections.

What is netstat?

400

This cryptographic key can be securely erased or deleted from a device's memory when it is no longer needed or when there is a risk of unauthorized access.

What is an effaceable key?

400

This individual is considered to have created the first smart card.

Who is Roland Moreno?

400

This DNS query type will traverse it's way up the DNS hierarchy until the domain is resolved.

What is recursive?

400

This attack involves sending ICMP broadcasts with spoofed IP addresses to various hosts, causing an overload of ICMP responses to the victim machine.

What is a smurf attack?

400

This external tool is useful for identifying the presence of difficult to find malware that has burrowed itself deep within the system and actively hides it's presence.

What is chkrootkit?

500

This is the default encryption method for most Android devices.

What is 128 Advanced Encryption Standard (AES) w/ Cipher-Block Chaining (CBC) (and ESSIV:SHA256) // aes-cbc-essiv:sha256?

500

Featured on the front of a CAC, this barcode type uses a base 929 encoding.

What is PDF417?

500

The following is displayed when investigating a network interface on a local Linux host:

UP BROADCAST RUNNING PROMISC MULTICAST

indicating the possible presence of this network threat.

What is a sniffer?

500

This common attack is represented by the following scenario:

While browsing the internet for a recipe on how to make a peanut butter and jelly sandwich, I click on an article for the recipe I was looking for. Unbeknownst to me, this website was compromised and there is now malware being installed on my machine silently in the background.

What is a drive-by-download?

500

This event ID is triggered when a user has successfully logged in.

What is 528?

M
e
n
u