Governance
Hacker Movie Trivia
Threat Intel
10

A horrible, badly designed program, used in our company to look up policies

What is Compliance 360?

10

The main protagonist in the movie HACKERS had this secret name

Who is Zero-Cool

10

Cl0p gang is from which country?

What is Russia?

20

According to this document, your emails can't be greater than 30 Megabytes

What is the Email Security Policy?

20

In the movie, The Net, the Pi symbol was a backdoor for this cyberterrorist organization

Who/What are the Praetorians?

20

QakBot is a modular banking trojan that has been used primarily by __________-motivated actors since at least 2007

What is Financially?

30

This document limits our company from hording data

what is the retention policy?

30

In the movie, War Games, all systems feed the WOPR, which runs through war scenarios leveraging the data it's fed and determines probable outcomes. WOPR stands for

War Operations Plan Response

30

APT33 is linked to which country?

What is Iran?
40

This document states that your smart phone should be positioned so nobody can see the screen

What is the Mobile Device policy?

40

In the movie the Matrix, Trinity runs an nmap scan to find out which version of SSH is running on the server, which nmap command is most accurate to pull that information?

A. nmap -sV -p 22 [target host]

B. nmap -v [target host]

C. nmap -F -p 21 [target host]

D. nmap -sV -p 25 [target host]

What is A?

40

TTP is an abbreviation for these categories that an attacker would leverage

What are Tactics, Techniques, and Procedures?

50

This document states that all Magellan systems, networks, and databases will have their clocks synchronized to an agreed, authoritative real-time standard

What is the Audit Logging and Monitoring Policy?

50

In the movie HACKERS, the end game was to hack the Gibson, what is gibson in reference to?

William Gibson, writer

50

There are __ links or stages involved in a cyber killchain

What is 7?

M
e
n
u