Protocols
Malware
Policy
Network
Crypto
100
This protocol is used to map IP network addresses to the hardware addresses used by a data link protocol.
What is ARP
100
A hidden piece of code that responds to a special input, allowing its user access to resources without passing through the normal security enforcement mechanism
What is backdoor/trapdoor
100
This is the organization’s definition of what it means to be secure
What is a security policy
100
This program is used to scan networks and ports
What is NMAP?
100
This is the result of encryption
What is ciphertext
200
This protocol is a stateful protocol
What is TCP
200
a piece of code that remains dormant in the host system until a certain time or event occurs
What is computer bomb
200
This regulatory requirement is for the protection of patients medical information
What is HIPAA
200
This conceptual model represents layers of networking
What is OSI?
200
This Roman's cipher is one of the most famous.
Who is Caesar?
300
This protocol is fire and forget
What is UDP?
300
This is technique is the most successful at tricking users to clicking links that download malware
What is phishing?
300
These five phases are used in the development life cycle of policies.
What are analysis, design, construction, test and maintenance
300
This numbering system is base 16 and uses 0-9 and A-F
What is hexadecimal?
300
This encryption technique utilizes multiple alphabets
What is Poly-alphabetic Cipher?
400
This protocol is used for translating IP addresses to URLs
What is DNS?
400
This is the scheme of classifying malware
What is taxonomy
400
This organization is responsible for developing policy for the US Government.
Who is NIST?
400
A set of rules that end points in a telecommunication connection use to communicate with each other
What are protocols?
400
One ought to design systems under the assumption that the enemy will immediately gain full familiarity with them
What is Shannon's Maxim
500
This protocol is primarily used for email
What is SMTP?
500
This software can help protect you from malware
What is anti-virus?
500
These people within an organization are responsible for following policies.
Who is everyone?
500
This protocol allows multiple computers to share one public IP Address
What is NAT?
500
This cipher is perfectly secure when used correctly!
What is a one-time-pad?
M
e
n
u