________ is a hacking technique that involves collecting data packets that travel through an unencrypted computer network.
Packet sniffing
Which fraudulent practice involves making phone calls to trick victims into providing sensitive information, like login credentials, credit card numbers, or bank details
Vishing (voice phishing)
Who was co-founder of Zscaler along with Jay?
Kailash Kailash
Where will the 2028 Olympic Games be held?
United States
Guess the term from this emoji?
0οΈβ£π«π€
Zero Trust
________ is a cybersecurity framework that requires healthcare organizations to implement controls for securing and protecting the privacy of electronic health information.
Health Insurance Portability and Accountability Act (HIPAA)
What do you call a Malware that does not replicate or clone through infections?
Trojans
Why did Zscaler not secure any quadrant in the recent Gartner's magic quadrant for Single vendor SASE report?
Zscaler requires customer to use 3 or more management consoles to operate the SaaS offering.
Name the sport in which a Singaporean won the Gold Medal?
Swimming
Guess the term?
ππ»ππ±
MFA
An _______ is a device or software application that monitors a network for malicious activity or policy violations.
Intrusion detection system (IDS)
What qualitative rating system is used to determine the severity of a vulnerability?
The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity. The numerical score can then be translated into a qualitative representation (such as low, medium, high, and critical) to help organizations properly assess and prioritize their vulnerability management processes.
Which Zscaler solution would you recommend for prospect and existing customers using VDI for web only applications (both SaaS and private apps)
Cloud Browser Isolation (CBI)
In Tennis, what is a golden slam?
Having won each of the four Grand Slam tournaments (Australian Open, French Open, Wimbledon, US Open) as well as an Olympic Gold medal.
ππ ΎοΈπ
Guess the term?
Cryptography
_______ is a cybersecurity solution that uses algorithms and machine learning to detect anomalies in the behavior of not only the users in a corporate network but also the routers, servers, and endpoints in that network.
User and entity behavior analytics (UEBA)
________ is a type of cyberattack in which threat actors exfiltrate a victimβs sensitive data in addition to encrypting it, giving the criminal additional leverage to collect ransom payments
Double extortion ransomware
Which tool would you use to acquire competative intelligence?
Klue
Which sport in Summer Olympics until 1992, required male competitors to be under 23 years old, and since 1996, a maximum of three over-23-year-old players have been allowed per squad?
Football
Guess the cybersecuirty movie name
ππ¬π₯π
The Social Network
What are the five Functions of NIST Cybersecurity Framework?
Identify, Protect, Detect, Respond, and Recover
________ is a type of cyberattack that leverages domain name system (DNS) queries and responses to bypass traditional security measures and transmit data and code within the network.
DNS Tunneling
Zscaler aquired _____ a SaaS application security platform innovator and who's platform is desinged to prevent organizations' growing risks of SaaS supply chain attacks.
Canonic Security
In 2008, whose record did Michael Phelps break to win a record number of most gold medals, in a single edition of Summer Olympics?
Mark Spitz
Guess the cybersecurity movie name
ππ§βπΎ
The Beekeeper