Defense in Depth
Cryptography
Manual Review
Consider the Following
R@ND0M
100

Security utilities combined into a single tool.

What is a Security Suite?

100

Type of encryption algorithm in which the encryption key is the same as the decryption key

What is Symmetric encryption?

100

The severity level of 0.(Syslogs)

What is an Emergency?

100

Liability that many organizations do not consider as part of their risk assessment.

What is Downstream Liability?

100

Someone in this LC who is a Youtuber.

Who is Jordan?

200

Type of training that teaches personnel the skills they need to perform their jobs in a secure manner.

What is Security Training?

200

Consists of software, protocols, algorithms and keys. (DAILY DOUBLE)

What is a cryptosystem?

200

Can be used to provide message integrity.

What is Hashing?

200

Ensures that more than one person can perform the job tasks of a single position within an organization.

What is Cross-training?

200

Stands for WWW.

What is the World Wide Web?

300

The concept in which a person initiates a request for a payment and another person authorizes the same payment.

What is Dual Control?

300

Being able to determine the a sender's identity and validity through...

What is Authentication?

300

The filtering and summarizing of data in some way.

What is data aggregation?

300

More expensive to implement than symmetric algorithms.

What are Asymmetric Algorithms?

300

She has a Bachelor and Master's in Computer Science.(Instructor in Per Scholas)

Who is Ms. Taylor?

400

A scenario where two bank employees who individually know only part of the combination for the safe and must both be present to open the safe.(Type of Knowledge) ***DAILY DOUBLE***

What is Split Knowledge?

400

Provides proof of the origin of data.

What is Non-repudiation?

400

A log with a private IP address that is blocked while attempting to enter the network.

What is a firewall log?

400

Makes sure that patterns are not produced during encryption.

What is an IV? (Initialization vector)

400

He said this: "Y'all don't read!" (DAILY DOUBLE)

Who is Professor Mac?

500

Type of report that is a complete analysis of all vulnerabilities found and a tool for network administrators, security officers, and IT managers to assess network security.

What is a Technical report?

500

Performs encryption by breaking the message into fixed-length units.

What is a block cipher?

500

The destination IP address and port number of this Syslog entry

Sep 2 23:02:27.143: %SEC-6-IPACCESSLOGP: list ACL-IPv4-E0/0-IN permitted tcp 192.168.1.3(1026) -> 192.168.2.1(80), 1 packet (DAILY DOUBLE)

What is 192.168.2.1 port 80?

500

An application and a protocol that is used to remotely log in to another computer using a secure tunnel.

What is SSH?(Secure Shell)

500

He said this: "Stay hungry. Stay foolish."

Who is Steve Jobs?

M
e
n
u