Essential Security Principles
Basic Network Security Concepts
Endpoint Security Concepts
Vulnerability Assessment and Risk Management
State to State
100

In relation to Cyber Security, what does CIA represent?

Confidentiality, Integrity and Availability

100

Identifiers that networks use to route traffic are called

IP addresses

100

Which command shows network traffic and includes options to filter what network traffic is being viewed?

tcpdump

100

What is the first step in vulnerability identification?

Collect a comprehensive inventory of environments components

100

Kansas City has often been referred to as the ____ Capital of the world?

The Haunted House Capital

200

What is a statement of aspirations and limitations set that outline how a group of individuals should conduct themselves

Code of Ethics

200

What are two (2) ways administrators can organize nodes?

By physical location & function

200

How should administrators maintain awareness of a network’s hardware assets?

Frequently scan networks and compare results to hardware inventory list

200

Name at least one of the three industry standard tools used to assess vulnerabilities

Nessus

OpenVAS

Microsoft Baseline Security Analyzer (MBSA)

200

Which Bucks player was third pick in the NBAs MVP Race this year?

Giannis Antetokounmpo

300

What is the most common authentication technique?

Password

300

How many firewalls are needed within a demilitarized zone (DMZ)?

two (2)

300

Name the other most volatile technical environment aside from application software

Operating systems

300

Any action that exploits a vulnerability successfully is know as a ___

Realized Risks

300

How many super bowls did the Kansas City Chiefs take the victory?

Three (3)

400

What is the maximum bit size when using Advanced Encryption Standard (AES)?

256 bits

400

Which type of algorithm does WPA2 use to provide secure encryption?

AES

400

Define applying security updates for software and hardware components

Patching

400

What is the continuous review of all sources to ensure compliance with policy?

Information Assurance

400

What is Wisconsin’s State Symbol?

A Badger

500

Name the protocol that supports secure remote communications

Secure Shell (SSH)

500

Name at least two (2) popular VPN Protocols?

Internet Key Exchange versions 2 (IKEvs)

Layer 2 Tunneling Protocol (L2TP)

Point-to-Point Tunneling Protocol ( PPTP)

Secure Socket Tunneling Protocol (SSTP)

500

Name one of the most common ways in which antimalware can function

Scanning files/network to compare them with known malware signatures

Examining behavior of processes and traffic-handling services

500

What is the first step in creating a Business Continuity Plan (BCP) or Disaster Recovery Plan (DRP)?

Conduct a business Impact Analysis (BIA), identifying critical business functions (CBFs)

500

Out of Milwaukee and Kansas City, which birthed Mickey Mouse and the M&M candy coating?

Kansas City

M
e
n
u