What am I?
Fill in the Blank
Are you authentic?
Ports
Yakety Yak, Don't Attack
100

This attack only occurs in Linux/Unix systems due to the dotted decimal file/folder system


DAILY TRIPLE!!!!!!!!

What is a Directory Traversal Attack?

100

A __________ table stores thousands of precomputed hashes

What is a Rainbow table?

100

Standard for authentication 

What is 802.1x

100

DHCP

What are ports 67 and 68?

100

a malware program that includes a back door for remote administrative control over the target computer. These are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment.

What is a RAT (Remote Access Trojan)?

200

the process of planning and designing a wireless network, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service (QoS). The survey usually involves a site visit to test for RF interference, and to identify optimum installation locations for access points. This requires analysis of building floor plans, inspection of the facility, and use of site survey tools.

What is a wireless site survey?

200

A __________ firewall looks at every communication, regardless if it has already been initiated and accepted

What is Stateless?

200

Used for authentication in home or SOHO networks

What is PSK (Pre Shared Key)?

200

DNS

What is port 53?

200

I am considered a cryptographic attack. I exploit the plaintext mixed in with the encrypted data. I am also known by the acronym KPA


DAILY DOUBLE!!!!!!!!!!!!

What is a Known Plaintext attack?



300

the practice of concealing a file, message, image, or video within another file, message, image, or video.

What is Steganography?

300

A _____ request opens a  TCP/IP connection 

What is SYN?

300

a solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network

What is NAC ( Network Access Control)?

300

SMTP

What is port 25?

300

an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. 

DAILY DOUBLE!!!!!!!!!!!!!!!!

What is MITM ( Man-In-The-Middle ) Attack?

400

The radiation pattern of this antenna is often described as doughnut shaped

What is Omnidirectional?

400

_________ access points rely upon wireless controllers


DAILY TRIPLE!!!!!!!!!!!!!!

What is thin?

400

An enterprise level authentication server that starts with a "R"

What is RADIUS?

400

SNMP

What are ports 161 and 162?

400

 sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.

DAILY DOUBLE!!!!!

What is Session Hijacking?

500

the customized login page that businesses require users to pass through before connecting to the Wi-Fi network. Airports, coffee shops, and hotels are the most popular places to find them, but any type of business can benefit from using this

What is a Captive Portal?

500

A _________________ rule will never be executed due to it's placement in the ACL


DAILY TRIPLE!!!!!!!!!!!!!!!

What is shadowed?

500

the customized login page that businesses require users to pass through before connecting to the Wi-Fi network. Airports, coffee shops, and hotels are the most popular places to find them, but any type of business can benefit from using this

DAILY DOUBLE!!!!!!!!

What is a Captive Portal?

500

NetBIOS

What are ports 137, 138 and 139?

500

Name 3 of the principles used in Social Engineering


DAILY TRIPLE!!!!!!!!!!!!!

What is Authority, Scarcity, Intimidation, Urgency, Social Proof and Familiarity?

M
e
n
u