Intro to Threats
Firewall Protection
Network Access Protection
Protocol Security Methods
Wireless Network Security
100
This attack uses a port to manipulate flaws in the system.
What is a Port Scan Attack?
100
[True or False] Firewalls function as traffic controllers for incoming and outgoing network transmissions.
What is True?
100
This occurs when a client is deemed unhealthy.
What is Quarantine?
100
IPSec uses this to maintain the integrity of data sent over a connection.
What is an Authentication Header?
100
This type of attack blocks the signal of Wi-Fi.
What is a Jamming Attack?
200
This type of attack floods the network to make a computer or network unreachable.
What is a Denial of Service Attack?
200
[True or False] Stateful-filtering cannot identify what packets belong in the same segment.
What is False?
200
This component of NAP runs on the client, and reports via Statement of Health.
What is the System Health Agent (SHA)?
200
Using this in a network configuration would make you unable to utilize L2TP/IPSec.
What is Network Address Translation (NAT)?
200
This type of attack makes multiple password attempts to gain access.
What is a Brute Force Attack?
300
Packets are targeted and intercepted to steal data.
What is a Sniffing Attack?
300
A type of firewall that can see incoming packets, but cannot identify the segment it belongs to.
What is a Packet-Filtering Firewall?
300
This component of NAP defines the response to non-healthy clients.
What is the Health Policy?
300
The most recently introduced tunneling protocol.
What is Secure Socket Tunneling Protocol (SSTP)?
300
This is currently the preferred/recommended security type when setting up Wi-Fi.
What is Wi-Fi Protected Access 2 (WPA)?
400
An attacker poses as a computer or website and reroutes to a malicious IP.
What is an IP Spoofing Attack?
400
A type of firewall that is typically found on e-mail servers?
What is a Content-Filtering Firewall?
400
The component of NAP that is used to signify a client meets health requirements.
What is the Health Certificate?
400
The year that DNSSEC was implemented to DNS servers on the Internet.
What is the year 2010?
400
The action of scanning an area in attempt to locate Wi-Fi signals.
What is War Driving?
500
An attacker uses zombie computers to attack networks and computers.
What is a Distributed Denial of Service Attack?
500
The area that is often found between a private network and the Internet.
What is a Demilitarized Zone (DMZ)?
500
The NAP enforcement method that utilizes TCP/IP to control network access.
What is Dynamic Host Configuration Protocol (DHCP) Enforcement?
500
In DNSSEC, hashing to maintain data integrity is aimed to prevent what?
What is DNS Cache-Poisoning?
500
This algorithm was orignally called Rijndael until is was selected by the U.S. National Institute of Standards and Technology (NIST).
What is the Advanced Encryption Standard?
Continue
ESC
Reveal Correct Response
Spacebar
M
e
n
u
Team 1
0
+
-
Network Security
No teams
1 team
2 teams
3 teams
4 teams
5 teams
6 teams
7 teams
8 teams
9 teams
10 teams
Custom
Press
F11
Select menu option
View > Enter Fullscreen
for full-screen mode
Edit
•
Print
•
Download
•
Embed
•
Share
JeopardyLabs