Staying Active
Turn of Phrase
Being Social
Total Control
Things That Can Help
100

When you create an active directory domain, this is the name of the default user account.

What is administrator?

100

This chilly phrase means "to start a conversation in a social situation to relieve tension.

What is "Break the ice"?

100

This fraudulent practice involves sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

What is phishing?

100

This type of security control acts against in-person intrusion attempts.

What is a Physical Control?

100

This is a free and open-source GUI-based packet analyzer that is used for network troubleshooting, analysis, software and communications protocol development, and education.

What is wireshark?

200

Domain, tree, forest and objects are the four major components of this technology.

What is Active Directory?

200

This feline phrase means "to reveal a secret accidentally".

What is "let the cat out of the bag"?

200

An email spoofing attack targeting a specific organization or individual by seeking unauthorized access to sensitive information.

What is spear phishing?

200

This type of security control discourages intrusion attempts.

What is a Deterrent Control?

200

This piece of hardware or software records data from frames as they pass over network media using methods such as a mirrored port or tap device.

What is a Packet Sniffer?

300

Active Directory uses this protocol for working with various directory services to store user and account information, as well as passwords.

What is LDAP?

300

Take a shot at this phrase meaning "to endure a painful experience or tough situation bravely".

What is "Bite the bullet"?

300

An impersonation attack in which the attacker gains control of an employee's account and uses it to convince other employees to perform fraudulent actions.

What is Business Email Compromise (BEC)?

300

This type of security control acts to eliminate or reduce the likelihood that an attack can succeed.

What is a Preventative Control?

300

This is a software capable of detecting and removing virus infections and (in most cases) other types of malwares, such as worms, Trojans, rootkits, adware, spyware, password crackers, network mappers, DoS tools, and others.

What is an Antivirus?

400

This technology is a virtual collection of policy settings, security permissions, and scope of management that you can apply to users and computers in Active Directory.

What is a Group Policy Object?

400

There's a flicker of hope that you'll get this phrase that means to work late into the night.

What is "burn the midnight oil"?

400

This attack involves a threat actor secretly relaying and possibly altering the communications between two parties who believe that they are directly communicating with each other, where in actuality the attacker has inserted themselves between the two user parties.

What is a Man-in-the-Middle or On-path Attack?

400

This type of control may not prevent or deter access, but will identify and record any attempted or successful intrusion.

What is a Detective Control?

400

This software and/or hardware system scans, audits, and monitors the security infrastructure for signs of attacks in progress.

What is an IDS? (Intrusion Detection System)

500

This protocol is a network authentication protocol, and is designed to provide strong authentication for client/server applications by using secret-key cryptography.

What is Kerberos?

500

Let's see if this holds water - you're looking for a phrase for a humorous way to say someone has died.

What is "Kick the bucket"?

500

This attack uses social engineering to infect a website and its visitors with malware. The infection usually spreads through a website specific to the victims' industry, like a popular website visited regularly.

What is a Watering-Hole Attack?

500

This type of control actively monitors for potential vulnerabilities or attacks, and then takes action to mitigate them before they can cause damage.

What is Responsive Control?

500
This software and/or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress and can actively block the attacks.

What is an IPS? (Intrusion Prevention System)

M
e
n
u