Playing in Network Traffic
Singing the Blues
Seeing Red
Deus Hoc Vault
Black Hat Crossing
100

If people could recall addresses as well as computers, we wouldn't need this system.

What is DNS?

100

An entry level Analyst is no match for this highest level of cybersecurity threat.

What is APT?

100

Both pentesters & clients sign these to protect IP rights.

What are NDAs?

100

These 3 letters mean a security breach may have taken place.

What is IoC?

100

Use this when a password is not enough protection.

What is MFA?

200

By duplicating this, a hacker can get much more than free coffee at Starbucks.

What is an SSID?

200

As the name suggests, you may not want to download these type of software.

What are PUPs?

200

This service provider commitment states the quality, availability, & duties to the client.

What is an SLA?

200

Alice performs this type of injection attack against Bob's directory system.

What is LDAP?

200

These are the set of data about what make APTs tick.

What are TTPs?

300

Also a type of "poisoning," this spoofing attack compromises a user's MAC.

What is ARP?

300

FTP secured by SSH is a different protocol from this one that uses TLS.

What is SFTP?

300

Using this, your social media accounts may tell a hacker all they need to know.

What is OSINT?

300

This centralized app monitors the network in enterprise environments.

What is SIEM?

300

This type of attack is also called a race-condition attack.

What is TOCTOU?

400

Smurfs & Fraggles are not our friends, but are instead versions of this type of system attack.

What is DoS? 

400

Related to BCP, this helps to ensure a flood doesn't shut down business-as-usual.

What is DRP?

400

This document describes the way and means that a pentest will take place.

What is RoE?

400

This network security solution is noted for its automation and orchestration.

What is SOAR?

400

This type of attack exploits the trust between the browser and client.

What is XSRF?

500

RTP enables this protocol when you use Signal to make secure calls. 

What is VoIP?

500

CVE & CVSS are components of this NIST standardization effort.

What is SCAP?

500

This is not a complete exploit, but more of a feasability study.

What is PoC?

500

DHS uses NCCIC's AIS to exchange IoCs using STIX via this transport mechanism.

What is TAXII?

500

A hacker might leave this bus in a parking lot to take you for a ride.

What is USB?