Friends
MSI
Cloud
SOC-IR
Malware and Attacks
100

What is the Hiro's full name?

Hiroto Tran

100

What was the percentage for last month (October review) QAQC report  for all cloud team?

%100

100

What are Amazon Shield and Google Cloud Armor used for?

DDoS protection

100

What is the primary goals for SOC?

-Detection

-Analyzed

-Respond to 

-managed 

cyber security incident

100

Can you count 5 of the malware types?

1.Viruses,  

2.Worms,  

3.Trojan,   

4.Spyware,   

5.Adware,   

6.Ramsomware,   

7.Rootkits,   

8.Keylogger,   

9.Botnets,  

200

When did Morgan graduate from her Collage?

May 2024

200

Motorola Solutions launches the first body-worn camera. How long is it lasting?

12 hours

200

Where do cloud providers store Service Accounts credentials?

Instance Metadata Service (IMDS)

200

It is a discussion based activity where team members review and discuss their role during an incident, without physically executing the plans. It is purpose to identify the gaps and improve the IR strategy. 

Tabletop Exercise

200

What is the name of most popular ransomware group in 2024?

LockBit 


300

Which country did Charles spend his PTO last year?

New Zeland

300

What is the MSI brand narrative?

Solving for safer

300

What type of deletion method is recommended as the best practice when removing cloud service cryptographic keys?

Soft deletion

300

What is the name of a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets?

Honeypot

300

It is a type of brute force attack. In this attack, an attacker will brute force logins based on list of usernames with default passwords on the application. What is the name of this attack?

Password spraying attack

400

When is the Harper's last child birthday and what is her name?

September 26th. Her name is Lucy.

400

The Avigilon Decision Management System (DMS) by Motorola Solutions is a finalist in the    ______       Awards’ Outstanding Commercial Security Solutions category in Jan 15th 2025. 

Intersec Expo

400

They are like a security guard stationed at the border of your subnets, controlling the inbound and outbound traffic for your VPC. They provide an additional layer of security. Their rules consist of allow or deny. What is the name of this?

NACLs: Network Access Control Lists

400

It enhanced threat detection in SOC and identify anomalies by comparing current activities against known normal behaviors, helping to detect potential threats that traditional signature-based method might missed. What is this describe for?

Behavioral Analysis

400

One of the benefit of using salted hash is preventing a specific type of attack. What is the name of this attack?

Rainbow Table Attack

500

How many kids does Jasmine have and what age are they in?

3 kids 

8

almost 6

3 and half

500

When did Motorola, Inc. separation and what are the names of new companies?

in 2011.

1. Motorola Solutions Inc.

2. Motorola Mobility Inc.

500

What attack type cause the Capital One breach in 2019?

SSRF

500

What is a detailed “how-to” guide for completing a commonly repeated task or procedure within a company's IT operations process

Runbook

500

Which type of cyber attack uses a constantly changing code, content, or structure in order to evade detection by security systems?

Polymorphic attack

M
e
n
u