Stuff you don't know
more Stuff you don't know
even more stuff you don't know
some stuff you don't know
equally more stuff you don't know
100

This is the unix command you would type to go back one directory.

What is `cd` and what does it do?

100

This kind of numerical response indicates a server-side error.

What is a 5xx HTTP Response?

100

This command recursively deletes every file and directory it touches.

What does the command `rm -rf` do?

100
This numerical value indicates a redirection error.

What is a 3xx HTTP Response?

100

ForgeRock

What is the project that Michael is currently working on?

200

The process of finding flaws on the target.

What is vulnerability assessment?

200

Unlike hashing, this can be converted back into its original format/data.

What is encryption?

200

The process of finding vulnerabilities on the target.

What is penetration testing?

200

Risk / Reward

What is the formula for Risk Assessment?

200

A protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.

What is ARP (Address Resolution Protocol)?

300

The preprogramming of certain tasks (usually via code) so that they can be completed autonomously.

What is automation (in terms of cybersecurity)?

300

This is a cyberattack that enables hackers to inject malicious client-side scripts into web pages.

What is XSS (Cross Site Scripting)?

300

This outlines the tasks and procedures that we must adhere to for a client. In addition, if they ask for something outside of our day to day activities, we must consult this before moving forward.

What is the SOW (Statement of Work)?

300

Regulating password length, complexity, and failed login attempts are a way of preventing this from happening.

What is brute force attempt logins?

300

One only detects intrusions and the administrator has to take care of preventing the intrusion, while the other detects the intrusion and also takes actions to prevent the intrusion.

What is the difference between IDS (Intrusion Detection System) and IPS (Intrusion Prevention System)?

400

A tool that shows the path of a packet. It lists all the points (mainly routers) that the packet passes through. This is used mostly when the packet is not reaching its destination.

What is traceroute?
400

They are: preparation, identification, containment, eradication, recovery and lessons learned.

What are the six steps of the Incident Response Process?

400

A system that helps us restrict whom and what accesses our information resources.

What is access control?

400

This is an encryption signing protocol that requires you to have a key beforehand.

What is RSA?

400

The organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities.

What is identity management?

500

The intentional or unintentional transmission of data from within the organization to an external unauthorized destination.

What is Data Leakage?

500

When a properly protected password system receives a new password, it creates a hash value of that password, a random data value, and then the combined value is stored in its database. This helps to defend against dictionary attacks and known hash attacks.

What are salted hashes?

500
Whichever team can list the most layers of the OSI model gets these 500 points.

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data Link Layer

Physical Layer

500

The preemptive gathering of IOC's, viruses, and plans of attack and implementing potential fixes/checking for them within your system.

What is Threat Hunting?

500

The harsh reality is that this will happen and you must be prepared for when it does.

Will we get hacked?