01 Great White Wireshark
02 Where Are My Keys?
03 HIPS Don't Lie
04 Oops I Snorted
05 Cat Phishing
100

These are the three main port states Nmap might report after conducting a scan.

What are Open, Closed, and Filtered?

100

This is the paid alternative to GPG. (PROVIDE FULL NAME)

What is Pretty Good Privacy (PGP)?

100

In the same way onions have layers, this security posture prevents network compromise at a single point of failure.

What is Defense in Depth (DiD)?

100

These are the three modes that Snort can operate in.

What are sniffer, packet logger, and NIDS?

100

This social engineering technique involves threatening to release information to defame someone, in order to coerce them into performing a desired action.

Blackmail

200

This command line tool will utilize Twofish encryption to conduct: port scanning, file transfers, remote administration, banner grabbing, proxying, or listening...

What is Cryptcat?

200

Base 64, UTF-8, ASCII, UTF-16, Hexadeimal, URL, JSON, and XML are all forms of what?

What is encoding?

200

This would be the term to describe a device that is analyzing packets; placed behind the firewall and off a span port so as not to interrupt traffic flow.

What is a Network-Based Intrusion Detection System (NIDS)?

200

These are uniquely identifying characteristics of known malware/threats that can be compared against to find malicious activity.

What are signatures?

200

This social engineering technique involves establishing a false narrative to trick a victim into providing sensitive information.

Pretexting

300

Nmap scans these ports by default.

What are 1,000 well-known ports?

300

This property of symmetric encryption hides the statistical relationship between cipher text and key.

What is confusion?

300

These are the two types of packet filtering conducted by firewalls.

What is stateless and stateful/dynamic?

300

This is the event classification to describe the following scenario:

My IDS alerts with the following message: "BRUTE FORCE LOGIN DETECTED". Upon inspection, it is revealed that a user simply forgot their password and made too many attempts.

What is a false positive?

300

DAILY DOUBLE!!! 

The answering team may wager as many points as they like and if they answer correctly those points are doubled. If not, they lose those points and no team will have the opportunity to steal. If the team has less than 500 points, they may still wager up to 500.

These three branches of the military have never had an insider threat incident, at least according to public knowledge.

400

This method of facilitating a buffer overflow attack will cause the program to jump to a known pointer stored within a register which points to the controlled buffer and thus the shellcode.

What is a trampoline sled?

400

This is the key I would use to encrypt a message via asymmetric encryption.

What is the recipient's public key?

400

This component of an IDS/IPS collects traffic for analysis.

What is the sensor/data processor?

400

Using a series of 0x90 opcodes, I can facilitate the execution of shellcode in this type of attack.

What is a buffer overflow attack?

400

Deemed the "worst breach of U.S. military computers in history", this attack began its infection via a road apple. It led to the formation of the US Cyber Command.

What is Operation Buckshot Yankee or Agent.BTZ?

500

This component of IPv6 creates a host's IP based on their MAC address. (FULL PROPER NAME)

What is Stateless Address Auto-configuration (SLAAC)?

500

This layer 3 security protocol provides a cryptographic layer to both IPv4 and IPv6.

What is IPSec?

500

This technique can be used by network administrators to separate your network into smaller parts, allowing you to isolate those sections if needed.

What is network segmentation?

500

These are the four categories of baseline configurations.

What are operating systems, network devices, applications, and cloud services?

500

LimeWire would be an example of this type of attack.

What is a drive-by-download?