What does OPSEC stand for?
Operational Security
What is a VPN?
What type of analysis is ordered by frequency?
Long Tail Analysis
What type of malware encrypts your data and makes you pay for it?
Ransomware
Who is the person in Beau's discord profile picture?
Guile!
What is a video of a person in which their face or body has been digitally altered so that they appear to be someone else?
A Deepfake!
What are the 2 types of VPNs?
Site to Site and Client to Site
What does the color red mean in TOC?
No disclosure of info
What is the name of the famous ransomware cryptoworm that struck during May 2017?
WANNACRY
Does Pineapple Belong on Pizza?
Yes.
What is the 2 types of OSINT?
Indirect or Direct / Passive or Active
What are the 2 (main) types of Proxys?
Forward and Reverse
Fill in the Blank: Intrusion, Intrusion Set, ______
Campaign!
What website can tell you if your sample has malware/viruses?
Virustotal! (Other websites are correct too)
Barbie Beavers or Bedridden Beavers?
BOTH ARE CORRECT! (But Bedridden really is)
What are Data Brokers?
Groups that mine public records and aggregate information on individuals
What's one file extension a file has when its containing Network Traffic information.
(*.pcap, *.pcapng, *.etl)
What is the hardest IOCS?
TTPS / Behaviors
What are the 2 types of program analysis?
Static and Dynamic
What's Locard’s Exchange Principle
“Every contact leaves a trace”
What is Bellingcat?
One of the best investigative journalists
What are the 5 functions of NIST Cyber Security Framework?
Identify, Protect, Detect, Respond, Recover
What are the 3 basic levels of Threat Intelligence?
Strategic, Operational, Tactical
What is Fuzzy Hashing?
Type of compression function that approximates hashing functions, where files that are slightly different still produce the same value
What's our class motto?
Celare et Revelare