What is the Hiro's full name?
Hiroto Tran
What was the percentage for last month (October review) QAQC report for all cloud team?
%100
What are Amazon Shield and Google Cloud Armor used for?
DDoS protection
What is the primary goals for SOC?
-Detection
-Analyzed
-Respond to
-managed
cyber security incident
Can you count 5 of the malware types?
1.Viruses,
2.Worms,
3.Trojan,
4.Spyware,
5.Adware,
6.Ramsomware,
7.Rootkits,
8.Keylogger,
9.Botnets,
When did Morgan graduate from her Collage?
May 2024
Motorola Solutions launches the first body-worn camera. How long is it lasting?
12 hours
Where do cloud providers store Service Accounts credentials?
Instance Metadata Service (IMDS)
It is a discussion based activity where team members review and discuss their role during an incident, without physically executing the plans. It is purpose to identify the gaps and improve the IR strategy.
Tabletop Exercise
What is the name of most popular ransomware group in 2024?
LockBit
Which country did Charles spend his PTO last year?
New Zeland
What is the MSI brand narrative?
Solving for safer
What type of deletion method is recommended as the best practice when removing cloud service cryptographic keys?
Soft deletion
What is the name of a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets?
Honeypot
It is a type of brute force attack. In this attack, an attacker will brute force logins based on list of usernames with default passwords on the application. What is the name of this attack?
Password spraying attack
When is the Harper's last child birthday and what is her name?
September 26th. Her name is Lucy.
The Avigilon Decision Management System (DMS) by Motorola Solutions is a finalist in the ______ Awards’ Outstanding Commercial Security Solutions category in Jan 15th 2025.
Intersec Expo
They are like a security guard stationed at the border of your subnets, controlling the inbound and outbound traffic for your VPC. They provide an additional layer of security. Their rules consist of allow or deny. What is the name of this?
NACLs: Network Access Control Lists
It enhanced threat detection in SOC and identify anomalies by comparing current activities against known normal behaviors, helping to detect potential threats that traditional signature-based method might missed. What is this describe for?
Behavioral Analysis
One of the benefit of using salted hash is preventing a specific type of attack. What is the name of this attack?
Rainbow Table Attack
How many kids does Jasmine have and what age are they in?
3 kids
8
almost 6
3 and half
When did Motorola, Inc. separation and what are the names of new companies?
in 2011.
1. Motorola Solutions Inc.
2. Motorola Mobility Inc.
What attack type cause the Capital One breach in 2019?
SSRF
What is a detailed “how-to” guide for completing a commonly repeated task or procedure within a company's IT operations process
Runbook
Which type of cyber attack uses a constantly changing code, content, or structure in order to evade detection by security systems?
Polymorphic attack