Crypto-nite
Framework Frenzy
Auth-tastic
Incident Insanity
Net-Work It
Threat Theater
Risky Business
Governance Galore
100

A method for securely exchanging cryptographic keys. 

What is Diffie-Hellman (D-H)? 

100

A system for identifying and cataloging security vulnerabilities. 

What is Common Vulnerabilities and Exposures (CVE)? 

100

A centralized platform for verifying identities, assigning permissions, and logging actions. 

What is Authentication, authorization, and accounting (AAA)? 

100

A team responsible for handling security incidents. 

What is Computer incident response team (CIRT)? 

100

Advanced firewall technology with features like app awareness and user-based filtering. 

What is Next-generation firewall (NGFW)? 

100

Threat actors supported by a country’s military and security services. 

What are Nation-state actors? 

100

The process of identifying and analyzing risks. 

What is Risk assessment? 

100

Regulations protecting personal data of EU citizens. 

What is General Data Protection Regulation (GDPR)? 

200

A technique for generating random values by sampling physical phenomena.

What is a True random number generator (TRNG)?

200

A method for quantifying vulnerability data and assessing risk.

What is Common Vulnerability Scoring System (CVSS)?

200

A process for managing identification, authentication, and authorization mechanisms.

What is Identity and access management (IAM)?

200

Procedures for managing security incidents, including preparation, detection, analysis, containment, eradication, and recovery.

What is Incident response lifecycle?

200

All-in-one security appliances combining multiple security functions.

What is Unified threat management (UTM)?

200

Threat actors using hacking for commercial gain.

What is Organized crime?

200

A numerical method for assessing risk probability and impact.

What is Quantitative risk analysis?

200

Requirements for document storage and retention related to financial operations.

What is Sarbanes-Oxley Act (SOX)?

300

A feature ensuring that a compromised key affects only a single session.

What is Perfect Forward Secrecy (PFS)?

300

A framework for automating vulnerability scanning.

What is Security Content Automation Protocol (SCAP)?

300

A personal authentication method for Wi-Fi networks.

What is Simultaneous Authentication of Equals (SAE)?

300

A technique to identify the underlying cause of a problem.

What is Root cause analysis?

300

Services using software-defined mechanisms for virtual tunnels and overlay networks.

What is Software-Defined Wide Area Network (SD-WAN)?

300

Threat actors motivated by social or political causes.

What are Hacktivists?

300

The annual cost of a risk to an organization.

What is Annualized Loss Expectancy (ALE)?

300

US law protecting personal healthcare data.

What is Health Insurance Portability and Accountability Act (HIPAA)?

400

An encryption mechanism used to enhance wireless security.

What is Temporal Key Integrity Protocol (TKIP)?

400

Standards and guidelines for effective security risk management.

What are Cybersecurity frameworks (CSF)?

400

A framework for implementing authentication providers.

What is Pluggable authentication module (PAM)?

400

A proactive approach to detecting threats not found by regular monitoring.

What is Threat hunting?

400

A networking and security architecture combining various security services with networking services.

What is Secure Access Service Edge (SASE)?

400

Threat actors with advanced capabilities for long-term unauthorized access.

What is Advanced persistent threat (APT)?

400

The comprehensive process of managing organizational risks.

What is Enterprise risk management (ERM)?

400

Groups sharing sector-specific threat intelligence.

What are Information Sharing and Analysis Centers (ISACs)?

500

A method for securing data in transit using protocols like WPA, IPsec, or TLS.

What is Transport/communication encryption?

500

An organization that develops computer security standards and publishes best practice guides.

What is National Institute of Standards and Technology (NIST)?

500

A protocol for managing remote and wireless authentication.

What is Remote Authentication Dial-In User Service (RADIUS)?

500

Using threat intelligence data to automate detection of adversary actions.

What is Intelligence fusion?

500

A security tool that detects and blocks attacks.

What is Intrusion prevention system (IPS)?

500

An entity responsible for a security incident.

What is a Threat actor?

500

Metrics for identifying emerging risks.

What are Key Risk Indicators (KRIs)?

500

Creating and monitoring policies to manage assets and ensure compliance.

What is Governance?

600

A technique to verify message integrity and authenticity by combining a cryptographic hash with a secret key.

What is Hash-based Message Authentication Code (HMAC)?

600

A set of guidelines to encourage the use of public key infrastructure.

What are Public Key Cryptography Standards (PKCS)?

600

A data format for exchanging authentication information.

What is Security Assertion Markup Language (SAML)?

600

Specific procedures for responding to detected events.

What is Incident response plan (IRP)?

600

A method for securing data in transit.

What is Transport/communication encryption?

600

The ability of a threat actor to use advanced techniques.

What is Level of sophistication/capability?

600

Reducing risk to acceptable levels.

What is Risk mitigation (or remediation)?

600

Senior executives responsible for setting strategy and ensuring compliance. 

What are Governance boards?

700

A set of guidelines to encourage the use of public key infrastructure.

What are Public Key Cryptography Standards (PKCS)?

700

A method for assessing the risk of vulnerabilities.

What is Common Vulnerability Scoring System (CVSS)?

700

An authentication scheme requiring multiple credentials.

What is Multifactor authentication (MFA)?

700

The process of identifying potential security incidents.

What is Detection?

700

A technique for verifying message integrity and authenticity.

What is Hash-based Message Authentication Code (HMAC)?

700

The financial and personnel resources available to threat actors.

What are Resources/funding?

700

Deploying controls to reduce risk likelihood and impact.

What is Risk deterrence (or reduction)?

700

Experts defining policies and standards within a specific domain.

What are Governance committees?

800

A framework involving certificate authorities, digital certificates, and other cryptographic components for validating identities.

What is Public key infrastructure (PKI)?

800

A framework for automating security assessments.

What is Security Content Automation Protocol (SCAP)?

800

An access control model managed by resource owners.

What is Discretionary access control (DAC)?

800

The process of removing malicious tools and configurations.

What is Eradication?

800

An encryption mechanism for wireless security.

What is Temporal Key Integrity Protocol (TKIP)?

800

An attack compromising the availability of a service.

What is Service disruption?

800

Determining that a risk is within acceptable levels.

What is Risk acceptance?

800

A senior role responsible for maintaining the confidentiality, integrity, and availability of an information asset.

What is an Owner?