Essential Security Principles
Basic Network Security Concepts
Endpoint Security Concepts
Vulnerability Assessment and Risk Management
State to State
100

In relation to Cyber Security CIA represents

What is Confidentiality, Integrity and Availability? 

100

Identifiers that networks use to route traffic

What are IP addresses?

100

Command that shows network traffic and includes options to filter what network traffic is being viewed

What is tcpdump?

100

The first step in vulnerability identification 

What is Collect a comprehensive inventory of environments components? 

100

What Kansas City has been referred to as 

What is The Haunted House Capital?

200

A statement of aspirations and limitations set that outline how a group of individuals should conduct themselves 

What is Code of Ethics?

200

Two ways administrators can organize nodes

What is physical location and function?

200

How administrators maintain awareness of a network's hardware assets 

What is Frequently scan networks and compare results to hardware inventory list 

200

At least one of the three industry standard tools used to assess vulnerabilities 

What is Nessus, OpenVas, and Microsoft Baseline Security Analyzer?

200

The Bucks player that was third pick in the NBAs MVP Race this year

Who is Giannis Antetokounmpo?

300

The most common authentication technique 

What is Password?

300

Number of Firewalls needed within a demilitarized zone

What is two?

300

The other most volatile technical environment aside from application software 

What are Operating systems? 

300

Any action that exploits a vulnerability successfully 

What is Realized Risks?

300

The number of super bowls the Kansas City Chiefs took to victory

What is 3?

400

The maximum bit size when using Advanced Encryption Standard (AES)

What is 256 bits?

400

Type of algorithm WPA2 uses to provide secure encryption

What is AES? 

400

Applying security updates for software and hardware components

What is Patching?

400

The continuous review of all sources to ensure compliance with policy

What is Information Assurance? 

400

Wisconsin's State Symbol

What is a Badger?

500

The protocol that supports secure remote communications

What is Secure Shell?

500

At least 2 popular VPN Protocols

What are Internet Key Exchange versions(IKEvs), Layer 2 Tunneling Protocol(L2TP), Point-to-Point Tunneling Protocol(PPTP), Secure Socket Tunneling Protocol(SSTP)? 


500

One of the Most common ways in which antimalware can function 

What is Scanning files/network to compare them with known malware signatures or Examining behavior of processes and traffic-handling services? 

500

The first step in creating a Business Continuity Plan or Disaster Recovery Plan

What is Conduct a business Impact Analysis, identifying critical business functions? 

500

Out of Milwaukee and Kansas City, birthed Mickey Mouse and the M&M candy coating

What is Kansas City?