This team consists of SOC analysts who are setting up their tools to protect assets. They are a defensive minded team.
What is Blue Team
Bad Bunny shattered records with how many people tuned in to this popular event hosted in February 2026.
What is the Super Bowl
New York
What is Albany
Controls incoming and outgoing traffic based on rules. Acts as a barrier between trusted and untrusted networks.
What is a firewall
Interconnected devices within a limited area such as a home or office.
What is a LAN
This team takes are considered "attackers". They primarily handle trying to break into defenses that are in the environment. Ethical testing of course
What is Red Team
This movie made in 1975 came out with one of the most famous lines "Tis but a scratch"
What is Monty Python and the Holy Grail
Massachusetts
What is Boston
Monitors network traffic for malicious activity and blocks threats in real-time
What is IDS/IPS
This network connects devices via wireless technology rather than using cables
What is a WLAN
This team focuses more on non technical controls and making sure we are compliant and assessing risk
What is white team
When looking up in the sky, you could see the brightest star "Polaris" or this name
What is the North Star
** DAILY DOUBLE **
California
What is Sacramento
A tool that collects logs, analyzes the logs, and creates alerts that could signify malicious activity.
What is a SIEM
A Network that spans across a large geographical area connecting other small networks together.
What is a WAN
**DAILY DOUBLE**
This team is a blend of two other teams where they secure applications before they go live. They are to think like attackers to spot vulnerabilities
What is Orange Team
When the declaration of independence was signed, there was one individual who had the biggest signature. Its even common for someone to use their name to ask for your signature.
What is John Hancock
Florida
What is Tallahassee
This solution ensures that only authenticated, authorized, and compliant devices can access a network.
What is Network Access Control
These work at layer 2 of the OSI model. They segment networks allowing devices to be grouped together, even if they are connected to different switches.
What is a VLAN
This team takes what is found from offensive results and creates defensive tactics.
What is Purple Team
What is the Vatican City
Washington
What is Olympia
Security professionals recommend users to utilize this type of software where it stores,creates and encrypts all login credentials and will generate secure passwords so users wont use the same password.
What is a password manager
Smallest basic network for a person in a small room/area
What is a PAN