Security Concepts
Network Threats and Attacks
Spoofing Attacks
Rogue System Attacks
Potpourri
100

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

What is a vulnerability?

100

This actor or agent is one that has no account or authorized access to the target system

What is an external threat?

100

This is a variation of an ARP poisoning attack where a switch's cache table is inundated with frames from random source MAC addresses.

What is MAC flooding?

100

An attack that exhausts a DHCP server's address pool

What is DHCP starvation attack?

100

A triathlon is an endurance multisport race consisting of swimming, cycling and running over various distances.  These are the two sports of a biathlon in the winter olympics.

What is cross-country skiing and rifle shooting?

200

This is data that can be used to identify or contact an individual (or, in the case of identity theft, to impersonate them) 

What is Personally Identifiable Information (PII)?

200

This allows a threat actor to discover the topology and general configuration of the network and security systems. 

What is footprinting?

200

This is exploiting a misconfiguration to direct traffic to a different VLAN without authorization. 

What is VLAN hopping?

200

An attack where a threat actor injects false resource records into a client or server cache to redirect a domain name to an IP address of the attacker's choosing.

What is poisoning?

What is spoofing?

200

This was the one song sung in English during Super Bowl XL (60).

What is Die with a Smile by Lady Gaga?

300

(100 points each) Data can be described as being in one of three states: 

What is at rest?

What is in transit/motion?

What is in use/processing?

300

A group of hosts or devices that has been infected by a control program, which enables attackers to exploit the hosts to mount attacks. Also referred to as a zombie.

What is a botnet?

300

This is an attack where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic. A.K.A. "Man-in-the-Middle (MitM)," "Manipulator in the Middle," "Machine in the Middle," and "Adversary in the Middle (AitM)"

What is on-path attack?

300

This is a common indicator of a compromised machine in the context of DNS attacks.

What is Suspect entries in the HOSTS file?

300

Name one of the next few GCIT events within the next month.

What is the Talent Show (Feb 20th)?

What is the Red Cross Blood Drive (Feb 25th)?

What is the School Musical (Mar 10-14th)?

What is NJGPA State Testing (Mar 16-19th)?

400

This is an audit process and tools for verifying compliance with a compliance framework or configuration baseline. For example verifying compliance with a health policy by using host health checks. 

What is posture assessment?

400

This sophisticated malware attack that remains undetected.

What is an advanced persistent threat (APT)?

400

This feature of 802.1Q do VLAN hopping attacks exploit.

What is Native VLANs?

400

This is the MOST likely cause of clients ending up with an incorrect IP configuration.

What is A rogue DHCP server on the network?

400

Mr. Favat is obsessed with Milano Cortina Winter Olympics 2026.  This country is leading in the medal count (all gold, silver, & bronze).

What is Norway?

500

(100 points each) This unit talks about five specific social engineering techniques.  Two are very similar.

What is phishing?

What is shoulder surfing?

What is tailgating & piggybacking?

What is dumpster diving?

500

(100 points each) This unit talks about five types of malware attacks.

What is viruses?

What is worms?

What is Trojans?

What is PuPs? PuAs?

500

This is the primary purpose of the Spanning Tree Protocol (STP) in a network.

What is to prevent switching loops?

500

This is where users purchase or introduce computer hardware or software to the workplace without the sanction of the IT department and without going through a procurement and security analysis process.

What is shadow IT?

500

Tralalero Tralala, Chimpanzini Bananini, Bombardiro Crocodilo, Tung Tung Tung Sahur, Ballerina Cappuccina, Frigo Camelo, Trippi Troppi Troppa Trippa

What is Italian brainrot?