Physical/ Hardware
Wireless
Malware & Attacks
Security Policy
Miscellaneous
100

Viewing information on a user's screen without their knowledge

What is Shoulder Surfing?

100

Secure encryption method used by WPA2 to protect wireless networks

What is AES (Advanced Encryption Standard?

100

A form of malware that has the ability to replicate without any intervention is referred to as a ____.

What is a worm?

100

Windows feature that lets any single file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent

What is EFS?

100

Information that, when used alone or with other relevant data, can identify an individual

What is PII (Personally Identifiable Information)?

200

Security measure that uses an individual's physical characteristics for authentication

What is biometrics?

200

Protocol and port number used to talk to the Microsoft directory service database used to manage computers and other devices on the network 

What is LDAP (Lightweight Directory Access Protocol), port 389?

200

One form of malware is disguised as an application that users unwittingly download and run, which leads to a virus. This form of malware is referred to as ____.

What is a Trojan Horse?

200

Technology that provides a secure tunnel over an un-trusted network.

What is a VPN?

200

Peter Parker's popular line at the end of "Avengers: Infinity War"

What is "Mr. Stark, I don't feel so good"?

300

A form of social engineering where an unauthorized person gains access to a controlled area by following in someone who has legitimate access.

What is tailgating?

300

Incorporate this on a home router to prevent network access to an unauthorized device based on its specific address.

What is MAC filtering?

300

The attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other

What is a Man in the Middle attack?

300

Windows allows removable flash drives and external hard drives to be encrypted using a process referred to as ____.

What is Bitlocker-to-Go?

300

Port number and protocol that allows secure login to a remote device.

What is SSH (22)?

400

A physical or logical subnetwork that contains and exposes an organization's external-facing services to an un-trusted, usually larger, network such as the Internet

What is a DMZ?

400

Used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?

What is a certificate?

400

Attack that occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers

What is a DDOS attack?

400

A feature of the Windows operating system that causes predetermined system actions when certain media is inserted

What is Autorun?

400

The cartoon show Ms. Courtney's background is taken from

What is Kim Possible?

500

Name three out of the five factors/ methods used for authentication

Something you know: Passwords, PIN numbers, account number

Something you have: Physical keys, fobs

Something you are: Biometrics

Somewhere you are: GPS, Geo-IP

Something you do: Signing your name

500

Name three out of the five 802.11 standards, their bandwidths and frequencies.

A: 54 Mbps/ 5.0 GHz

B: 11 Mbps/ 2.4 GHz

G: 54 Mbps/ 2.4 GHz

N: 600 Mbps/ 2.4 & 5.0 GHz

AC: 1300 Mbps or 1.3 Gbps/ 5.0 GHz

500

A fast-moving virus that is able to attack the boot sector and executable files simultaneously

What is a multipartite virus?

500

Technology from Microsoft that can be used by system administrators to apply policies and configurations to groups of user accounts and client PCs

What is Active Directory?

500

A computer connected to the Internet that has been compromised and can be used to perform malicious tasks under remote direction

What is a zombie?

M
e
n
u