Mentors
Linux Commands
Intel
Cyber Attacks
Mystery
100

Misaki's favorite smell.

What is New Mexico rain?

100

Clear the terminal screen.

What is clear?

100

The tracking, analyzing, and countering of digital security threats.

What is cyber intelligence?

100

This is a computer program that spreads or self-replicates and requires user interaction to activate.

What is a virus?

100

The amount of layers in the OSI model.

What is 7?

200

Jeff wants to transform between this thing and a human for the rest of his life.

What is a satellite?

200

Display the current working directory.

What is pwd?

200

Name 2 Types of Intelligence.

What is (1) Strategic; (2) Operational; (3) Technical; and (4) Tactical?

200

Emails with bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all indicators of these.

What are email scams or phishing attempts?

200

Detection of, resilience against, response to and recovery from incidents.

What is cybersecurity?

300

This mentor claims to have been punched in the face by a ghost.

Who is Martin?

300

Change the current directory.

What is cd?

300

Planning & Direction, Collection, Processing, Analysis & Production, and Dissemination.

What is the CIA 5 Step Intelligence Process?

300

An eavesdropping attack that occurs when attackers insert themselves into a two-party transaction.

What is man-in-the-middle?

300

The three interrelated layers of cyberspace.

What is blue, red, and gray cyberspace?

400

Lara's most memorable trip.

What is a Disney cruise and an international spy museum?
400

Temporarily elevates privileges allowing users to complete sensitive tasks without logging in as the root user

What is sudo?

400

They are responsible for coordinating and conducting impact assessments of controlled unclassified information (CUI) compromises.

Who is the Damage Assessment Management Offices (DAMOs)?

400

Beware of these types of programs that track every stroke you make while typing in an effort to glean your password.

What is keylogging?

400

An extra layer of security used to verify account login attempts.

What is two factor authentication?

500

Your favorite mentor.

Who is all of them?

500

Check the connectivity between two nodes.

What is ping?

500

An additional element that a Threat Impact Assessment brings in addition to a Damage Assessment of lost data.

What is (1) In depth threat picture derived from multiple sources; (2) Adversary strategic approach – Threat threads; (3) Intelligence & vulnerability gaps; and (4) Prioritized protection strategy?

500

It is usually contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.

What is a Trojan Horse?

500

Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is Insider threat?