Commands
Encryption
Frameworks
More Fun
Even More Fun
100

This command uses ICMP to determine if a host on the network is alive.

What is PING?

100

This encryption type uses the SAME key for both encrypting and decrypting messages.

What is symmetric encryption?

100

This strategy gives users access to what they need to perform their job duties but nothing more.

What is least privileged access?

100

Job rotation, separation of duties,  and mandatory vacation policies.

What are examples of security best practices that help prevent employees from committing fraud or abuse?

100

This protocol is used to keep the time synchronized across devices.

What is NTP?

200

This command supports troubleshooting by showing the path a packet takes through the network.

What is TRACERT or TRACEROUTE?

200

This is a password-based authentication protocol used by Point-to-Point Protocol (PPP) to validate users

What is PAP (password authentication protocol)?
200

Merchants in the US must follow this information security standard used to handle credit cards from major card brands. 

What is PCI DSS?

200

A process of finding weaknesses in cryptographic algorithms and using these weaknesses to decipher the ciphertext without knowing the secret key.

What is Cryptanalysis?

200

This protocol allows provides a means to transfer files.

What is FTP?

300

This command allows a user to lookup the IP ADDRESS that corresponds to a domain name.

What is NSLOOKUP or DIG?

300

This term refers to the number of bits in a key used by a cryptographic algorithm. An increase in this typically means better security.

What is "key length" or "key size"?

300

This framework  provides a process that integrates security, privacy, and cyber supply chain risk management activities into the system development life cycle. It includes 6 phases including CATEGORIZE>SELECT> IMPLEMENT> ASSESS>AUTHORIZE>MONITOR.

What is the NIST Risk Management Framework?

300

SAML and OATH2 are used by these systems to enable single sign on and designed to allow a website or application to access resources hosted by other web apps on behalf of a user .

What is an Identity Provider (IdP)?
300

This network process makes setting up secure wireless networks in small businesses and homes easier.

What is WPS (Wifi Protected Setup)?

400

This command line utility for Linux and Unix-like operating systems has the primary purpose to convert and copy files.

What is dd?

400
In this context, its not something added to your French fries or soup but instead added to stored passwords to prevent rainbow table attacks.

What is SALT?

400

Controlling who has access to evidence, labeling and cataloging, and logging who has access to evidence are examples of this.

What is ensuring proper Chain of Custody?

400

An approach to public-key (asymmetric) cryptography based on the algebraic structure of elliptic curves over finite fields.

What is elliptic curve cryptography (ECC)?

400

This is the preferred encryption type used on wireless networks today.

What is WPA2 (wifi protected access 2)?

500

This program dumps system memory to the standard output stream, skipping over holes in memory maps. By default, the program dumps the contents of physical memory.

What is memdump?

500

This term is used to describe the result of putting plaintext through an encryption algorism do its not readable without the key.

What is ciphertext?

500

This procedures outlines steps of what an organization should do in the event of an incident. Steps include Detect & Analysis, Containment, Eradication, Recovery, and Post Incident Activity.

What is the NIST Computer Security Incident Handling Guide?

500

This computer software that makes it simpler to deploy many of the open source programs and plugins used in The Sleuth Kit. The graphical user interface displays the results from the forensic search of the underlying volume, making it easier for investigators to flag pertinent sections of data.

What is Autopsy?
500

Name, email, employee ID are examples of what these when working with IdP (Identity Providers).

What are attributes?