A horrible, badly designed program, used in our company to look up policies
What is Compliance 360?
The main protagonist in the movie HACKERS had this secret name
Who is Zero-Cool
Cl0p gang is from which country?
What is Russia?
According to this document, your emails can't be greater than 30 Megabytes
What is the Email Security Policy?
In the movie, The Net, the Pi symbol was a backdoor for this cyberterrorist organization
Who/What are the Praetorians?
QakBot is a modular banking trojan that has been used primarily by __________-motivated actors since at least 2007
What is Financially?
This document limits our company from hording data
what is the retention policy?
In the movie, War Games, all systems feed the WOPR, which runs through war scenarios leveraging the data it's fed and determines probable outcomes. WOPR stands for
War Operations Plan Response
APT33 is linked to which country?
This document states that your smart phone should be positioned so nobody can see the screen
What is the Mobile Device policy?
In the movie the Matrix, Trinity runs an nmap scan to find out which version of SSH is running on the server, which nmap command is most accurate to pull that information?
A. nmap -sV -p 22 [target host]
B. nmap -v [target host]
C. nmap -F -p 21 [target host]
D. nmap -sV -p 25 [target host]
What is A?
TTP is an abbreviation for these categories that an attacker would leverage
What are Tactics, Techniques, and Procedures?
This document states that all Magellan systems, networks, and databases will have their clocks synchronized to an agreed, authoritative real-time standard
What is the Audit Logging and Monitoring Policy?
In the movie HACKERS, the end game was to hack the Gibson, what is gibson in reference to?
William Gibson, writer
There are __ links or stages involved in a cyber killchain
What is 7?