In relation to Cyber Security, what does CIA represent?
Confidentiality, Integrity and Availability
Identifiers that networks use to route traffic are called
IP addresses
Which command shows network traffic and includes options to filter what network traffic is being viewed?
tcpdump
What is the first step in vulnerability identification?
Collect a comprehensive inventory of environments components
Kansas City has often been referred to as the ____ Capital of the world?
The Haunted House Capital
What is a statement of aspirations and limitations set that outline how a group of individuals should conduct themselves
Code of Ethics
What are two (2) ways administrators can organize nodes?
By physical location & function
How should administrators maintain awareness of a network’s hardware assets?
Frequently scan networks and compare results to hardware inventory list
Name at least one of the three industry standard tools used to assess vulnerabilities
Nessus
OpenVAS
Microsoft Baseline Security Analyzer (MBSA)
Which Bucks player was third pick in the NBAs MVP Race this year?
Giannis Antetokounmpo
What is the most common authentication technique?
Password
How many firewalls are needed within a demilitarized zone (DMZ)?
two (2)
Name the other most volatile technical environment aside from application software
Operating systems
Any action that exploits a vulnerability successfully is know as a ___
Realized Risks
How many super bowls did the Kansas City Chiefs take the victory?
Three (3)
What is the maximum bit size when using Advanced Encryption Standard (AES)?
256 bits
Which type of algorithm does WPA2 use to provide secure encryption?
AES
Define applying security updates for software and hardware components
Patching
What is the continuous review of all sources to ensure compliance with policy?
Information Assurance
What is Wisconsin’s State Symbol?
A Badger
Name the protocol that supports secure remote communications
Secure Shell (SSH)
Name at least two (2) popular VPN Protocols?
Internet Key Exchange versions 2 (IKEvs)
Layer 2 Tunneling Protocol (L2TP)
Point-to-Point Tunneling Protocol ( PPTP)
Secure Socket Tunneling Protocol (SSTP)
Name one of the most common ways in which antimalware can function
Scanning files/network to compare them with known malware signatures
Examining behavior of processes and traffic-handling services
What is the first step in creating a Business Continuity Plan (BCP) or Disaster Recovery Plan (DRP)?
Conduct a business Impact Analysis (BIA), identifying critical business functions (CBFs)
Out of Milwaukee and Kansas City, which birthed Mickey Mouse and the M&M candy coating?
Kansas City