Guardians of the Gate
Data Defenders
Threat Trackers
Access Avengers
Network Navigators
Cyber Sleuths
100

A software or hardware device that filters incoming and outgoing network traffic based on predetermined security rules.

What is a firewall?

100

Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered.

What is encryption?

100

A person or entity responsible for an event that has been identified as a security incident or as a risk.

Who is a threat actor? 

100

A method of validating a particular entity’s or individual’s unique credentials.

What is authentication?

100

A means of determining a receiver’s position on Earth based on information received from orbital satellites.

What is a global positioning system (GPS)? 

100

The process of gathering and submitting computer evidence for trial. Digital evidence is latent, meaning that it must be interpreted.

What is digital forensics? 

200

A software application running on a single host and designed to protect only that host.

What is a host-based firewall?

200

A message digest encrypted using the sender’s private key that is appended to a message to authenticate the sender and prove message integrity.

What is a digital signature?

200

Social engineering techniques for gathering valid credentials to use to gain unauthorized access.

What is credential harvesting?

200

The process of determining what rights and privileges a particular entity has.

What is authorization?

200

A secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

What is a virtual private network (VPN)?

200

In digital forensics, a tool that shows the sequence of file system events within a source image in a graphical format.

What is a timeline? 

300

A firewall designed specifically to protect software running on web servers and their back-end databases from code injection and DoS attacks.

What is a web application firewall (WAF)?

300

A password that is generated for use in one specific session and becomes invalid after the session ends.

What is a one-time password (OTP)? 

300

Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

What is a remote access Trojan (RAT)?

300

An authentication scheme that requires the user to present at least two different factors as credentials.

What is multifactor authentication (MFA)?

300

Services that use software-defined mechanisms and routing policies to implement virtual tunnels and overlay networks over multiple types of transport network.

What is a Software-Defined Wide Area Network (SD-WAN)?

300

In digital forensics, being able to trace the source of evidence to a crime scene and show that it has not been tampered with.

What is provenance?

400

Advances in firewall technology, from app awareness, user-based filtering, and intrusion prevention to cloud inspection.

What is a next-generation firewall (NGFW)?

400

In PKI, a CA that issues certificates to intermediate CAs in a hierarchical structure.

What is a root certificate?

400

A cryptographic attack where the attacker exploits the need for backward compatibility to force a computer system to abandon the use of encrypted messages in favor of plaintext messages.

What is a downgrade attack? 

400

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

What is single sign-on (SSO)?

400

Provisioning virtual network appliances, such as switches, routers, and firewalls, via VMs and containers.

What is network functions virtualization (NFV)?

400

A forensic tool to prevent the capture or analysis device or workstation from changing data on a target disk or media.

What is a write blocker?

500

A server that redirects requests and responses for clients configured with the proxy address and port.

What is a non-transparent proxy?

500

A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.

What is a certificate authority (CA)? 

500

Any type of physical, application, or network attack that affects the availability of a managed resource.

What is a denial of service (DoS) attack?

500

In a federated network, the service that holds the user account and performs authentication.

What is an identity provider (IdP)?

500

A firewall designed specifically to protect software running on web servers and their back-end databases from code injection and DoS attacks.

What is a web application firewall (WAF)?

500

Record of handling evidence from collection to presentation in court to disposal.

What is chain of custody?

600

A type of proxy server that protects servers from direct contact with client requests.

What is a reverse proxy?

600

A Base64 ASCII file that a subject sends to a CA to get a certificate.

What is a certificate signing request (CSR)? 

600

An attack that involves the use of infected Internet-connected computers and devices to disrupt the normal flow of traffic of a server or service by overwhelming the target with traffic.

What is a distributed DoS (DDoS) attack?

600

A number used in conjunction with authentication devices such as smart cards; as the PIN should be known only to the user, loss of the smart card should not represent a security risk.

What is a personal identification number (PIN)?

600

A type of IDS that monitors a computer system for unexpected behavior or drastic changes to the system’s state.

What is a host-based intrusion detection system (HIDS)?

600

A technique used to determine the true cause of the problem that, when removed, prevents the problem from occurring again.

What is a root cause analysis? 

700

A server that redirects requests and responses without the client being explicitly configured to use it.

What is a transparent (or forced or intercepting) proxy?

700

A list of certificates that were revoked before their expiration date.

What is a certificate revocation list (CRL)?

700

A DoS attack where the attacker sends numerous SYN requests to a target server, hoping to consume enough resources to prevent the transfer of legitimate traffic.

What is a SYN flood attack?

700

A wireless network authentication mode where a passphrase-based mechanism is used to allow group authentication to a wireless network.

What is a pre-shared key (PSK)?

700

Endpoint protection that can detect and prevent malicious activity via signature and heuristic pattern matching.

What is a host-based intrusion prevention system (HIPS)?

700

An analysis of events that can provide insight into how to improve response and support processes in the future.

What is a lessons learned report (LLR)?