Top Flight Security
Who are you?
Proofs in the pudding
Is your router secure?
InSSIDer Threat
100

These short, sturdy posts are used to block vehicles from entering secure areas.

What are bollards?

100

A router rule explicitly permits HTTPS traffic while denying all other inbound connections.

What is an access control list (ACL)?

100

This MFA method sends a one-time code to a user’s email for login verification.

What are email authentication codes?

100

This basic router hardening step prevents attackers from using well-known factory credentials.

What is changing default passwords?

100

Disabling this feature hides the wireless network name from casual discovery tools.

What is SSID broadcast?

200

Alvin uses this security type to allow access to his server room, he requires your hand and eye to be scanned.

What is Biometrics?

200

This system manages user identities, roles, and access permissions across an organization.

What is IAM (Identity and Access Management)?

200

This MFA method uses an app on a smartphone to generate time-based codes.

What are authenticator applications?

200

This router feature allows or blocks traffic based on source or destination IP addresses.

What is IP filtering?

200

This outdated wireless encryption standard can be cracked in minutes and should never be used.

What is WEP?

300

This security device detects metal objects on a person to help prevent weapons from entering a secure area.

What is a magnetometer? 

300

A help-desk technician can reset passwords but cannot install software or access payroll systems.

What is the principle of least privilege (PoLP)?

300

An employee inserts a USB device that generates login codes without needing internet access.

What is a hardware token?

300

This router feature automatically opens ports for applications but increases security risk if enabled.

What is Universal Plug and Play (UPnP)?

300

This action helps prevent attackers from using default network names to identify router models.

What is changing the SSID?

400

This small electronic device is often used for keyless entry and proximity-based authentication.

What are key fobs?

400

A company requires continuous verification of users, devices, and location—even after successful login.

What is the Zero Trust model?

400

An organization remotely wipes a lost company smartphone and enforces screen-lock policies.

What is MDM(Mobile Device Management)?

400

This network segment hosts public-facing servers while isolating them from the internal LAN.

What is a screened subnet (DMZ)?

400

A wireless network uses strong encryption but shares one password among all employees.

What is WPA2-PSK or WPA3-SAE (Simultaneous Authentication of Equals)?

500

This secured entry area prevents tailgating by allowing only one person through at a time.

What is an Access Control Vestibule (Mantrap)?

500

This individual rule inside an access control list allows or denies permissions for a specific user or group.

What is an Access Control Entry (ACE)?

500

A system blocks users from emailing files that contain credit card numbers.

What is DLP (Data Loss Prevention)?

500

This firewall feature directs external traffic on a specific port to an internal device.

What is port forwarding or port mapping?

500

This wireless configuration allows visitors internet access while isolating them from internal devices.

What are guest accounts or guest networks?

M
e
n
u