Shadow Legends
Things
You Might Want to Start With 100
Knowledge is Power
Sailing
100

According to the CompTIA A+ exam, RAID stands for this.

What is Redundant Array of Independent Disks?

100

This type of social engineering attack uses email, phone or text to entice a user to click on a malicious link. The communication appears to be from a legitimate source connected to the user. When the user selects the ill-intentioned link, the user's device or system becomes infected with malware and data is often compromised.

What is Phishing?

100

This connection-oriented protocol allows computers to send and receive data at the same time, using segments as the basic units of data transmission.

What is TCP?

100

This e word refers to trying to be like a person or thing. This word is used especially when one is trying to equal or surpass someone in accomplishment or achievement.

What is emulate?

100

This protocol uses port 22.

What is Secure Shell?

200

This RAID level stripes data evenly across two or more disks to increase performance, but provides no fault tolerance or redundancy.

What is RAID 0?

200

With this physical social engineering tactic, a hacker gains access to restricted areas of a building by following an approved employee into the building and piggybacking on their credentials. In these cases, the social engineer often pretends to be an employee or even a delivery person.

What is Tailgating?

200

This flag represents segments that are used to initiate a connection.

What is SYN?

200

This u word describes things (usually motives, objectives, reasons, agendas, etc.) that are kept hidden in order to achieve a particular result.

What is ulterior?

200

This protocol uses port 53.

What is DNS?

300

This RAID level consists of an exact copy (or mirror) of a set of data on two or more disks with no parity, striping or spanning of disk space across multiple disks.

What is RAID 1?

300

This term refers to methods employed by hackers to gain the trust of an end user so that the hacker can obtain information that can be used to access data or systems.

What is Social Engineering?

300

This flag represents segments that are used to confirm that the data packets have been received, and also used to confirm the initiation request and tear down requests.

What is ACK?

300

This p word refers to the quality or state of being near. Is also synonymous with closeness.

What is proximity?

300

If I was setting up a DHCP server, I would use these ports.

What are ports 67 and 68?

400

This RAID level uses block-level striping with distributed parity to have redundancy while increasing write performance. Uses a minimum of three drives, and is still functional if only one drive fails.

What is RAID 5?

400

This is a category of malware where attackers use various methods to encrypt your data, making it inaccessible, or bar you from entry to a particular system or device.

What is Ransomware?

400

This flag is used to signify the connection is down or maybe the service is not accepting the requests.

What is RST?

400

This j word is defined as "exposure to or imminence of death, loss, or injury"; it is synonymous with danger.

What is Jeopardy?

400

If you are hosting an FTP server, you would use these ports.

What are ports 20 and 21?

500

This RAID level uses block-level striping with double parity, allowing it to have redundancy, but has a performance penalty on write operations because of the associated parity calculations, doubling CPU overhead on write operations. Uses a minimum of 4 drives, and because of the double parity, can have two drives fail and still be functional.

What is RAID 6?

500

This standalone malware computer program replicates itself in order to spread to other computers, often using a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.

What is a worm?

500

This flag indicates that the connection is being torn down; both the sender and receiver send these segments to gracefully terminate the connection.

What is FIN?

500

This d word refers to something held as an established opinion, a code of such tenets, or a point of view put forth as authoritative without adequate grounds. It can also refer to a doctrine or body of doctrines about faith or morals.

What is Dogma?

500

If I was hosting a mail relay server for sending email, I would use this port.

What is port 25?