During one of our first labs we brute forced a remote login on a Windows server. Which port did we find letting us know that this remote login was available?
What is 3389
100
This is a small room with locks on both sides of both doors entering and exiting.
What is Man Trap (People Trap)
100
Bob lost his private key again. What do we do now?
What is Revoke
100
These new devices can handle many security tasks such as firewall, content filtering, and network anti-virus.
What is UTM Security Appliance (Or ASA)
200
What tool did we use to inspect what ports were open on all of our hosts connected to the network?
What is nmap
200
Water may be preferred in some environments and may be code still in others. But what type of system is best to use to put out a data center fire?
What is Gaseous Fire Suppression (FM200, FE12, FE25, Halon)
200
"Cypher" is both my encryption and decryption key. Which encryption type am I using?
What is Symmetric
200
Telnet was great in it's day...right? Now you should use this instead to connect to your network equipment and remote linux hosts.
What is SSH
300
What mode did we have to get to in Linux and OS X in order to change the passwords in our password recovery labs?
What is Single-User Mode
300
Camera's and Motion Detectors are these types of controls.
What is Detective
300
Symmetric or Asymmetric. This one is faster.
What is Symmetric
300
NIDS and HIDS are nice. But I also want it's sibling system.
What is IPS
400
Which wireless security protocol did we get through by de-authing joined workstations?
What is WPA2
400
Iris and Fingerprint are two types of this type of authentication.
What is Biometrics
400
What is this an example of? SSL_RSA_WITH_RC4_128_MD5
What is Cyphersuite
400
You'll find this Access Control Method in mostly government IS environments.
What is Bell-LaPadula OR Lattice OR Mandatory OR MAC