PKI utilizes this type of encryption.
What is asymmetric encryption?
This device uses a time-based algorithm to generate authentication codes.
What is a RSA Token?
This type of firewall inspects individual data packets as they pass through; based on information such as IP addresses and port numbers.
What is a packet filtering/stateless firewall?
This is a program or device designed to intercept and capture network traffic.
What is a sniffer?
Mr. Tucker and Mr. R both consider this to be the most exhausting and overrated anime of all time.
What is One Piece?
This is what you would submit to a CA.
What is a Certificate Signing Request (CSR)?
This is a temporary authentication code valid for a single use or a short period.
What is a one time password (OTP)?
This type of firewall can prevent session hijacking by keeping track of active connections.
What is a stateful/dynamic firewall?
Sniffers typically operate in this mode.
What is promiscuous/passive?
Your fellow anime connoisseur Mr. Tucker considers this to be his favorite Studio Ghibli movie.
What is Howl's Moving Castle?
These are the four advantages/goals achieved through the use of PKI.
What is Authentication, Encryption, Non-repudiation, and Data Integrity?
These are the four categories of MFA.
What is Knowledge, Possession, Inherence, and Location?
This device acts as an intermediary between client and server, hiding internal network segments.
What is a proxy firewall/application level gateway?
These are the sniffer detection methods discussed in class.
What is ping method, DNS method, ARP method, latency method, and local host method?
Mr. Vavra won the NAGA Hawaii championship in this sport.
What is No-Gi Brazilian Jiu-Jitsu?
SSH is comprised of these three main components.
What is Transport Layer, User Authentication Layer, and Connection Layer?
This USB or NFC device stores cryptographic keys for authentication.
What is a security key?
A NGFW operates on these layers.
What is layer 3 (network), layer 4 (transport), and layer 7 (application)?
Sending an ICMP echo request with an incorrect MAC address would be an example of this sniffer detection method.
What is the ping method?
Mr. Tucker's father served in this branch of the US military.
What is the Army?
In the TLS handshake, this phase includes everything from ClientHello to creation of the "master secret".
What is the negotiation phase?
This device stores information (such as PKI certificates and digital fingerprints) on your CAC.
What is the Integrated Circuit Chip (ICC)?
These are the two versions of the vulnerability tool we discussed in class, one free and one paid.
What is Nessus Essentials and Nessus Professional?
DAILY DOUBLE!!!
The team who selected this may collaborate, and must decide how many points they would like to wager. There is no steal.
A CSR is comprised of these three components.
Mr. R once was a team USA athlete in this chilly sport.
What is bobsledding?