Manage Risk
Monitor Networks
Security Controls
Access Mgmnt
Encryption
100

Cold site

What is a site that provides limited recovery services, such as an empty warehouse with electricity only?

100

PING

What ICMP command is used to check the connectivity between hosts on a local network? 

100

Encryption, Anti-virus software, IDS, IPS, Firewalls, and privilege management.

What are Technical Controls?

100

My fingerprints

What is something I am in Access management?

100

MD5, SHA1, SHA2, SHA3, HMAC, RIPEMD

What are hashing algorithms?

200

Transference

What is it called when a company decides to buy insurance to guard against risk.  

200

SIEM

What network monitoring tool allows for viewing consolidated system logs and information collected from multiple systems?

200

Awareness training, configuration and change management, contingency planning, media protection (hard drives, USB, etc), cameras/door locks/HVAC.

What are types of Administrative Security Controls? 

200

My password. 

What is something I know in access management?

200
bcrypt, PBKDF2,

What are key stretching algorithms?

300

Assessment

Analysis

Response

Mitigation

What are the four factors of Risk Management?

300
tracers, traceroute

What is a command used to map the network path to a network resource. 

300
Lighting, signs, fences, security guards, and bollards. 

What are types of Physical Security controls? 

300

CAC card. 

What is an example of something I have in Access management?

300

DES, 3DES, AES, BLOWFISH, TWOFISH, RC4

What are types of symmetric cyphers? 

400

Single Loss Expectancy (SLE) * Annual Rate of Occurrence (ARO)

What is the Annual Loss Expectancy (ALE) formula?

400

SNMP

What protocol is used to collect network management information?

400

Hardening, security awareness and training, security guards, change management, and account disablement.

What are types of Preventive controls? 

400

My location.

What is somewhere I am in Access management? 
400

CA, RA, RSA, PKI certificates

What are components of Assymetric encryption? 

500

MTTR

What is the acronym for the time it takes a component to recover from an incident? 

500

Wireshark

What is protocol/network sniffer? 

500

Log monitoring/audits, trend analysis/baselining, security audits, video surveillance, motion detection. 

What are types of Detective controls? 
500

I type really slow and hunt and peck.

What is something I do in a unique way in Access management. 

500

Data is encrypted in sections, not at the bit level.

What is block cypher?