What’s That Protocol
Mobile Security
I just liked the name
The Cloud
Types of Stuff
100

This protocol runs on SSH to provide file system functionality and transferring capabilities

What is Secure File Transfer Protocol (SFTP)?

100

Gaining root access to the operating system in an Apple device is known as this

What is Jailbreaking?

100

Rainbow table attacks can be stopped by using this process of adding characters to a password before it is hashed

What is Salting?

100

Jeff’s company uses AWS servers to host their network and applications. Jeff’s company is using this kind of cloud model

What is Public Cloud?

100

This type of Wi-Fi Protected Access (WPA) is the most secure, introducing the process of Simultaneous Authentication of Equals (SAE) to fix past vulnerabilities

What is WPA3?

200

Joe plans to have a video call with his manager and wants to make sure the conversation is private. This would be the best protocol for Joe to use

What is Secure Real Time Protocol (SRTP)?

200

If a device is ever lost, this can be done to remove all data from the device

What is Remote Wipe?

200

Although now known as a screened subnet, this was a portion of the network that provided security between your network and the Internet by giving public access to public resources

What is Demilitarized Zone (DMZ)?

200

Larry is a web developer intending to create a web app. This cloud service model would likely be the best solution

What is Platform as a Service (PaaS)?

200

This type of firewall examines every packet regardless of any history

What is Stateless Firewall?

300

Flo uses this protocol in her VPN to connect sites over a layer 3 network as if they were connected at layer 2

What is Layer 2 Tunneling Protocol (L2TP)?

300

Edward is only able to login when he is within 10 miles of the company office, demonstrating this concept

What is Geofencing?

300

In this system, the company chooses, buys, and owns the mobile device that an employee can use

What is Corporate Owned, Personally Enabled (COPE)?

300

In cloud computing, this is the ability to increase or decrease available resources as the workload changes

What is Elasticity?

300

This type of proxy is commonly used to protect and control user access to the Internet

What is Internal/Forward Proxy?

400

This protocol automatically assigns IP addresses and doesn't have built in security

What is Dynamic Host Configuration Protocol (DHCP)?

400

This form of wireless communication is commonly seen in mobile payment systems such as Apple Pay

What is Near Field Communication (NFC)?

400

Andy is a software engineer working on an application. He can use this concept to test the input validation on the login screen

What is Fuzzing?

400

These are isolated locations within a region for hosting cloud hardware

What are Availability Zones (AZ)?

400

James notices that his company’s load balancer sends traffic to server 1, then server 2, then server 3, and continually repeats this process. The load balancer is likely using this type of scheduling

What is Round-robin scheduling?

500

Po’s device needs a digital certificate while doing wireless authentication. Po is likely using this protocol to authenticate

What is Extensible Authentication Protocol - Transport Layer Security (EAP-TLS)?

500

This allows for both mobile and non-mobile devices to be managed using the same applications

What is Unified Endpoint Management (UEM)?

500

Traffic flowing within a data center is known as this

What is East-West traffic?

500

This cloud security solution can allow/disallow applications based on their JSON strings and API requests

What is Next-Gen SWG (Secure Web Gateway)?

500

Edward’s company VPN decrypts traffic when accessing the company network, but not when accessing non-company websites. Edward’s company is using this type of VPN tunnel

What is Split VPN tunnel?

M
e
n
u