In relation to Cyber Security CIA represents
What is Confidentiality, Integrity and Availability?
Identifiers that networks use to route traffic
What are IP addresses?
Command that shows network traffic and includes options to filter what network traffic is being viewed
What is tcpdump?
The first step in vulnerability identification
What is Collect a comprehensive inventory of environments components?
What Kansas City has been referred to as
What is The Haunted House Capital?
A statement of aspirations and limitations set that outline how a group of individuals should conduct themselves
What is Code of Ethics?
Two ways administrators can organize nodes
What is physical location and function?
How administrators maintain awareness of a network's hardware assets
What is Frequently scan networks and compare results to hardware inventory list
At least one of the three industry standard tools used to assess vulnerabilities
What is Nessus, OpenVas, and Microsoft Baseline Security Analyzer?
The Bucks player that was third pick in the NBAs MVP Race this year
Who is Giannis Antetokounmpo?
The most common authentication technique
What is Password?
Number of Firewalls needed within a demilitarized zone
What is two?
The other most volatile technical environment aside from application software
What are Operating systems?
Any action that exploits a vulnerability successfully
What is Realized Risks?
The number of super bowls the Kansas City Chiefs took to victory
What is 3?
The maximum bit size when using Advanced Encryption Standard (AES)
What is 256 bits?
Type of algorithm WPA2 uses to provide secure encryption
What is AES?
Applying security updates for software and hardware components
What is Patching?
The continuous review of all sources to ensure compliance with policy
What is Information Assurance?
Wisconsin's State Symbol
What is a Badger?
The protocol that supports secure remote communications
What is Secure Shell?
At least 2 popular VPN Protocols
What are Internet Key Exchange versions(IKEvs), Layer 2 Tunneling Protocol(L2TP), Point-to-Point Tunneling Protocol(PPTP), Secure Socket Tunneling Protocol(SSTP)?
One of the Most common ways in which antimalware can function
What is Scanning files/network to compare them with known malware signatures or Examining behavior of processes and traffic-handling services?
The first step in creating a Business Continuity Plan or Disaster Recovery Plan
What is Conduct a business Impact Analysis, identifying critical business functions?
Out of Milwaukee and Kansas City, birthed Mickey Mouse and the M&M candy coating
What is Kansas City?