Perimeter Security
Who are you, who who
I Need More
Misc
Firewalls
100

To quote the Bible, "Let there be ______."

What is light

100

The process of proving one's identity.

What is Authentication?

100

A hardware token is an example of this type of authentication.

What is something you have?

100

To delete files, this NTFS permission must be given.

What is Modify?

100

Because it can filter traffic based upon MAC addresses, a firewall might be called by this layer device.

What is a Layer 2 device?

200

Don't take another step or you will be detected.

What is a motion sensor?

200

Also known as SSO.

What is Single Sign-On?

200

This physical security control prevents tailgating.

What is a mantrap?

200

This Linux command is used to set file system permissions

What is chmod?

200

Because it can filter traffic based upon UDP and TCP ports, a firewall might be called by this layer device.

What is a layer 4 device?

300

The correct key will open this door mechanism.

What is a lock?

300

Microsoft's ADFS and the open-source Shibboleth project are examples of this.

What is Identity Federation?

300

This modern short-distance wireless standard is used for payment cards and terminals.

What is NFC?

300

This type of malware encrypts data files and demands payment before providing a decryption key.

What is Ransomware?

300

Because it can filter traffic based upon content of packets., a firewall might be called by this layer device

What is Layer 7?

400

Placed at the entrance to a facility, watch as one door opens only after one door closes.

What is a mantrap?

400

A password, PIN, or your favorite color are examples of this.

What is something you know?

400

This term is used to describe the act of tricking people into divulging sensitive information.

What is social engineering?

400

This type of VLAN attack overloads switch MAC table memory.

What is MAC flooding?

400

Because it can filter traffic based upon IP addresses, a firewall might be called by this layer device

What is Layer 3?

500

Although not as effective as guards, if trained properly, these serve as a great deterrent to trespassers.

What are guard dogs?

500
A username and password are examples of this type of authentication.

What is single factor authentication?

500

This VPN authentication tool uses a changing numeric code synchronized with the VPN appliance.

What is a keyfob?

500

This type of security device monitors, but doesn't do anything to prevent intrusions.

What is an IDS (or Intrusion Detection System)? 

500

Network Intrusion??? Not while I'm on the job.

What is an Intrusion Prevention System?

M
e
n
u