Physical
Perimeter
Network
Host
Application
100

The first measure in physically securing a building.

What is a perimeter barrier?

100

Researching a company in order to find critical details.

What is organizational reconnaissance?

100

When perpetrators attempt to compromise or affect the operations of a system in some way.

What is an active attack?

100

A self-replicating program.

What is a worm?

100

Uses labels for both subjects (users who need access) and objects ( resources with controlled access, such as data, applications, systems, networks, and physical space).

What is Mandatory Access Control (MAC)?

200

A preventative tool (when monitoring live events) or an investigative tool (when events are recorded for later playback).

What is a CCTV (Closed-Circuit Television)?

200

Changes the IP address information within a packet.

What is IP spoofing?

200

Allows a user to take advantage of a software bug or design flaw in an application to gain access to system resources or additional privileges that aren't typically available to that user.

What is privilege escalation?

200

Consists of an attacker trying to correctly guess many passwords or passphrases.

What is a brute force attack?

200

An open system that can be used on Macintosh and Unix systems.

What is Kerberos?

300

 Ensures that hardware does not leave the organization's premises without a manager's approval.

What is a checkout policy?

300

Used on most internal networks, usually in the intranet zone, so that internal users do not require a physical connection.

What is a wireless network?

300

Allows users to share content and access content shared by other users without centralized servers or centralized access control.

What is peer-to-peer software?

300

A collection of patches, hotfixes, and other system enhancements that have been tested by the manufacturer for wide deployment.

What are service packs?

300

Used by Microsoft for auditing to identify past actions performed by users on an object.

What is a System Access Control List?

400

Where most of the network devices and cables are stored.

What is a data center?

400

Allows traffic directed to the public resources inside the DMZ. Also prevents unauthorized traffic from reaching the private network.

What is a packet filter?

400

Overloads the switch's MAC forwarding table to make the switch function like a hub.

What is MAC flooding?

400

TCP/IP protocol that provides no authentication, encryption, or error detection.

What is TFTP?

400

An attack where software or malware is downloaded and installed without explicit consent from the user.

What is a drive-by download?

500

A reduction in voltage that lasts longer than a few seconds.

What is a brownout?

500

Inspects traffic as it flows between networks.

What is a network-based firewall?

500

A logical grouping of computers based on switch port.

What is a VLAN?

500

Provides information about which operating system a computer uses and might provide entry points or information about ways to formulate an attack.

What are open ports?

500

A program that adds functionality and features to a Web browser, including extra toolbars and interactive Web content.

What are Add-ons (Plug-ins or Browser Extensions)?

M
e
n
u