Advanced Cryptography
Networking and Server Attacks
Secure Network Admin / Client and App Sec
Wireless
BCP and Risk Mitigation
200

A _______ is a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest.

What is salt.

200

This attack occurs when an attacker manipulates a process and attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

What is a buffer overflow attack

200

This type of network virtualizes parts of the physical network so that it can be more quickly and easily reconfigured. This is largely accomplished by separating the control plane from the data plane.

What is a Software Defined Network (SDN)

200

This is an AP that is set up by an attacker to mimic an authorized AP on the victims network.

What is an evil twin

200

This policy defines actions that users may perform while accessing systems.

What is an Acceptable Use Policy (AUP)

300

A PKI system handles the creation, storage, distribution, and _________ of certificates.

What is revocation.

300

In a ____ - ______ ______ ( _ _ _ ) attack, the threat actor takes advantage of web applications that accept user input without validating it before presenting it back to the user.

What is cross-site scripting (XSS)

300

Which version of this network management protocol uses usernames and passwords instead of a 'community string'?

What is SNMPv3, or v3

300

There are two modes of WPA2: Personal and Enterprise. In Enterprise mode, a _________ server is used to provide user authentication.

What is RADIUS.

300

This is the average amount of time that it will take a device to recover from a failure that is not a terminal failure.

What is MTTR or Mean Time To Recovery

400

“_____ ______” is the resiliency of a crypto key to attacks.

What is "Key strength".

400

In a _ _ _ _______ ________ an attacker uses a publicly accessible DNS server to flood a victim by redirecting valid responses.

What is a DNS amplification attack.

400

These things allow the administrator to configure a switch to copy traffic that occurs on some or all ports to a designated port on the switch.

What are Port mirrors

400

This protocol was originally developed for wired networks but is used often in IEEE 802.11 networks to provide ‘port-based authentication’. It accomplishes this by implementing an authentication process that uses an “authentication server”, an “authenticator”, and a “supplicant”.

What is is 802.1X

400

A security control is any device or process that is used to reduce risk. There are two levels of security controls:

(1) Administrative controls – processes for developing and ensuring that policies and procedures are carried out

(2) __________ controls – security controls carried out or managed by devices

What is technical

500

The _______ ________ ________ ________ is a request/response protocol that performs a real-time lookup of a certificate’s status

What is “Online Certificate Status Protocol” (or OCSP)

500

In this attack, the attacker uses the user’s web browser settings to impersonate that user.

What is a Cross-Site Request Forgery (X S R F)

500

This short but sturdy vertical post is used as a vehicular traffic barricade to prevent a car from “ramming” into a secured area.

What is a bollard

500

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection. 

What is Bluesnarfing

500

Business Continuity is an organization’s ability to maintain operations after a disruptive event. Preparing for this involves the following three things:

(1) Business continuity planning

(2) Business impact analysis

(3) ________ ________ ________

What is Disaster recovery planning

600

A ________ is an input value that must be unique within some specified scope.

What is a nonce.

600

In this attack, an attacker broadcasts a network request to all computers on the network but changes the address from which the request came from (called IP spoofing).

What is a smurf attack

600

This type of attack (or infection) occurs when malware is planted in the ROM firmware of a device, it can difficult or impossible to clean an infected device.

What is a supply chain attack, or infection(s)

600

This encryption protocol is used for WPA2 and specifies the use of CCM with AES. (It is also one of the longest representations of a four letter acronym :)

What is Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

600

________ _________ refers to a system’s ability to deal with malfunctions. To achieve this, redundancy is often built into the system.

What is Fault tolerance

M
e
n
u