Potent Protocols
Authentication Authorities
Logs
Cloud Computing and Models
Extras
100

This transfer protocol typically uses ports 20 and 21

What is FTP?

100

This centralized system allows for a user to authenticate once and be granted access to all resources that the user has rights

What is Single Sign On? (SSO)

100

This log type in Windows deals with OS activity and it's component services.

What is a system log?

100

This cloud model is often shared between two or more organizations, often in same industry

What is a Community Cloud?

100

This team typically serves as oversight to both red and blue teams, and has the power to direct and halt hacking activities if they go beyond scope.

What is the white team?

200

This protocol is used to ensure all logging sources are synchronized to the same time source

What is Network Time Protocol (NTP)

200

Upon login, a user is presented with this document to read and agree to before allowed access to organization's resources. 

What is an Acceptable Use Policy? (AUP)

200

For Non-Windows hosts, events are managed and logged by this.

What is syslog?

200

This cloud model is often less expensive than others, but does run the risk of "multitenant solutions"

What is a public cloud?

200

This exercise is typically facilitator led, where staff practice responses to a particular risk scenario.

What is a tabletop exercise?

300

These protocols enable the use of Virtual Private Networks (VPN). You must name all three for full points, but individual protocols are worth 100 each.

What are IPsec, SSH, and TLS?

300

This security measure requires a user to engage in at least two different authentication methods. 

What is Multi-Factor Authentication?

300

In addition to making sure logs are synchronized to the same time source, logs should be accounted for any variation in this.

What are Time Zones?

300

Also can be termed as a "Virtual Private Cloud," this cloud service model allows for rapid generation of virtual servers, application and any other required functions.

What is Infrastructure as a Service? (IaaS)

300

This type of attack relies on over filling an application's designated memory allotment 

What is a buffer overflow attack?

400

This protocol is typically used to transfer STIX

What is TAXII?
400
This web format is used by applications for authentication, authorizations and for other types of data exchange and uploading. Common applications that make use of it include SOAP or SAML.

What is Extensible Markup Language? (XML)

400

This type of software collects data in one or more of the following methods: Listener/collector, sensor and agent based

What is a Security Incident and Event Manager? (SIEM)

400

This type of cloud software is typically enterprise management software designed to mediate access to cloud services by users across all types of devices

What is a Cloud Access Security Broker? (CASB)

400

This archaic communication method, now readily on the decline, is often used as a command and control platform.

What is Internet Relay Chat?

500

This protocol allows compatible scanners to determine whether a computer meets a configuration baseline

What is Security Content Automation Protocol?

500

This framework can ensure that email messaging is secured against spoofing when authentication fails, typically by flagging, quarantining or rejecting messages.

What is Domain-Based Message Authentication, Reporting and Conformance? (DMARC)

500

This security data can be used to detect pass the hash and golden ticket attacks.

What are Windows Security Logs?

500

Cloud storage containers are often referred to as these. 

What are buckets or blobs?

500

This threat actor type has the potential to be the most devastating, but can be deflected with good security, account control and monitoring policy

What is an insider threat?

M
e
n
u