Internet Protocols
Why you attacking me bro
Not so hard skills
Policy is the best Policy
Miscellaneous
200

This version of IP has 128-bit address.

IPv6

200

or '1'='1 is an example of this kind of attack.

SQL Inection

200

This is the term that means “thinking about thinking”.

Metacognition

200

A step-by-step document that is used for operations

Procedure

200

This is a brief 30-90-second introduction of yourself.

Elevator Pitch

400

What field of a packet header indicates IPv4 or IPv6?

Version Field (first 4 bits)
400

this type of attack is used to steal information from Bluetooth activated devices.

Bluesnarfing

400

What is the term for the “ability to recruit cognitive, motivational, and emotional resources to achieve long-term goals”?

Self-regulation

400

This policy is intended to address specific needs within an organization

Issue-specific Policy

400

A user being assigned to a group that has authorization to perform functions on certain data is an example of what kind of control?

Role-Based Access control (RBAC)

600

Which IP version provides support for encryption?

IPv6

600

During this type of attack the hacker eavesdrops on data sent back and forth between two people, networks or computers.

Man-in-the-Middle (MITM)

600

“Money, location, benefits, job satisfaction, promotion opportunities” are examples of?

examples of job offer priorities

600

a high-level policy that sets the overall tone of an organizations security approach.

Program Policy

600

What security risk currently sits as #5 on the OWASP top ten?

Security Misconfigurations
800

What field in a packet header limits the number of hops a packet is allowed to take before it reaches it's destination?

Time-to-Live (TTL)

800

This attack uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.

DNS poisoning (also known as DNS Cache Poisoning or DNS Spoofing)

800

It has been said that “prolonged stress, extended adversity, intense/protracted worry, chronic insomnia or other health condition, not knowing your strengths, and the habit of hiding behind others”  are examples of?

“factors that can disrupt self-regulation”

800
an NDA (non-disclosure agreement) is an example of what kind of policy?

Issue-specific policy

800

Something you have, something you are, and something you know are forms of this.

Multi-factor Authentication (MFA)

1000

What ICMPv6 Type/code error indicates port unreachable?

Type 1 code 4

1000

This type of attack takes control of the hypervisor.

Hyperjacking

1000

This process is comprised of the following: Forethought phase, Performance phase, Self-reflection phase

phases of the self-regulation process

1000

This policy compels the safeguarding of information while it eliminates, or at least reduces, personal liability for employees

Security policy

1000

Personal Effectiveness Competencies and Workplace Competencies are two soft-skill related tiers that are part of this model.

NICE Cyber Security Competency Model