Security Threats and Vulnerabilities
Network Attacks
Network Attacks mitigations
Device security
Misc
100

Unsecured user accounts, misconfigured internet services and network equipment are all examples of what kind of vulnerability?

What is Technological?

100

Name 2 of the 3 types of malware

What are trojan horses, viruses, and worms?

100

This hardware sits in between two or more networks, controls the traffic between them, and helps prevents unauthorized access

What is a Firewall?

100

This protocol is used in place of telnet for encrypting traffic on devices for secure remote access

What is SSH?

100

Five routers walk into a bar. Who gets the car keys

What is The Designated Router?

200

This kind of threat is described when a threat actor sends you a virus that can reformat your hard drive

What is data loss or manipulation?

200

This disabling or corruption of networks, systems, or services is done through multiple coordinated sources

What is Distributed Denial of service?

200

This habit is the most effective way of protecting against data loss

What is keeping frequent backups?

200

A device must have a unique _____ other than the default to support SSH

What is hostname?

200

What do they call a group of network engineers

An outage

300

This kind of threat is described when a threat actor impersonates another person to obtain credit information about that person

What is identity theft?

300

The type of attack that uses discovery and mapping of systems, services, or vulnerabilities

What are reconnaissance attacks?

300

List the 2 of the 4 types of Firewalls

What is, packet filtering, application filtering, URL filtering, and stateful packet inspection (SPI)?


300

This global configuration command prevents unauthorized individuals from viewing plaintext passwords in the configuration file

What is service password-encryption?

300

WHO HAS ANY GOOD ARP JOKES!?

(First to laugh or respond “me” gets the point)

400

This kind of threat is described when a threat actor overloads a network to deny other users network access

What is disruption of service?

400

The type of attack that uses unauthorized manipulation of data, system access, or user privileges

What are access attacks?

400

List the triple A acronym

What is Authentication, Authorization, and Accounting?

400

To create a strong password name 4 of these 6 guidelines

length of at least eight characters, complex, avoid repetition or commonalities, misspell, change often, do not write down

400

How did pirates communicate before the internet?

Pier to pier communication

500

Name 3 of the 4 classes of physical threats

What are hardware, environmental, electrical, and maintenance?

500

A threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties in this type of access attack

What is man in the middle?

500

This can recognize and filter out specific types of attacks such as DoS attacks

What is Stateful packet inspection (SPI)

500

This cisco command is used to show all open ip ports

What is show ip ports all?

500

How do you catch an ether bunny?

With an ethernet